Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
i7j22nof2Q.exe

Overview

General Information

Sample name:i7j22nof2Q.exe
renamed because original name is a hash value
Original sample name:ad01c8fa6ec2371dfd9f57200f84e13a.exe
Analysis ID:1556586
MD5:ad01c8fa6ec2371dfd9f57200f84e13a
SHA1:0fb1d82d89253d853dcb0e5d66f4b0d2b067b48d
SHA256:5179029eb225a9937cc7507b084cc8418f4d84e3c99e13b5a2a0cc8fdba75bd3
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
PE file has a writeable .text section
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • i7j22nof2Q.exe (PID: 7452 cmdline: "C:\Users\user\Desktop\i7j22nof2Q.exe" MD5: AD01C8FA6EC2371DFD9F57200F84E13A)
    • i7j22nof2Q.tmp (PID: 7504 cmdline: "C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp" /SL5="$20410,5992012,721408,C:\Users\user\Desktop\i7j22nof2Q.exe" MD5: 438F4076E92D3C839405BAB4652FE2CE)
      • net.exe (PID: 7564 cmdline: "C:\Windows\system32\net.exe" pause avidenta_11132 MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 7572 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 7616 cmdline: C:\Windows\system32\net1 pause avidenta_11132 MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • avidenta32.exe (PID: 7624 cmdline: "C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe" -i MD5: 5F301B2942D42D35402C384009767E5F)
  • cleanup
{"C2 list": ["bvubwie.com"]}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2630520865.0000000002C00000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: avidenta32.exe PID: 7624JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-15T17:25:15.488237+010020494671A Network Trojan was detected192.168.2.949710185.208.158.20280TCP
        2024-11-15T17:25:16.517420+010020494671A Network Trojan was detected192.168.2.949711185.208.158.20280TCP
        2024-11-15T17:25:19.747761+010020494671A Network Trojan was detected192.168.2.949711185.208.158.20280TCP
        2024-11-15T17:25:20.781819+010020494671A Network Trojan was detected192.168.2.949713185.208.158.20280TCP
        2024-11-15T17:25:21.829341+010020494671A Network Trojan was detected192.168.2.949715185.208.158.20280TCP
        2024-11-15T17:25:22.884065+010020494671A Network Trojan was detected192.168.2.949716185.208.158.20280TCP
        2024-11-15T17:25:23.303855+010020494671A Network Trojan was detected192.168.2.949716185.208.158.20280TCP
        2024-11-15T17:25:23.720551+010020494671A Network Trojan was detected192.168.2.949716185.208.158.20280TCP
        2024-11-15T17:25:24.765774+010020494671A Network Trojan was detected192.168.2.949717185.208.158.20280TCP
        2024-11-15T17:25:25.809295+010020494671A Network Trojan was detected192.168.2.949718185.208.158.20280TCP
        2024-11-15T17:25:26.918910+010020494671A Network Trojan was detected192.168.2.949719185.208.158.20280TCP
        2024-11-15T17:25:28.130423+010020494671A Network Trojan was detected192.168.2.949720185.208.158.20280TCP
        2024-11-15T17:25:29.165529+010020494671A Network Trojan was detected192.168.2.949721185.208.158.20280TCP
        2024-11-15T17:25:29.578428+010020494671A Network Trojan was detected192.168.2.949721185.208.158.20280TCP
        2024-11-15T17:25:30.640804+010020494671A Network Trojan was detected192.168.2.949722185.208.158.20280TCP
        2024-11-15T17:25:31.700049+010020494671A Network Trojan was detected192.168.2.949723185.208.158.20280TCP
        2024-11-15T17:25:33.703580+010020494671A Network Trojan was detected192.168.2.949724185.208.158.20280TCP
        2024-11-15T17:25:34.764778+010020494671A Network Trojan was detected192.168.2.949725185.208.158.20280TCP
        2024-11-15T17:25:35.791590+010020494671A Network Trojan was detected192.168.2.949726185.208.158.20280TCP
        2024-11-15T17:25:36.209969+010020494671A Network Trojan was detected192.168.2.949726185.208.158.20280TCP
        2024-11-15T17:25:37.353042+010020494671A Network Trojan was detected192.168.2.949727185.208.158.20280TCP
        2024-11-15T17:25:38.398773+010020494671A Network Trojan was detected192.168.2.949728185.208.158.20280TCP
        2024-11-15T17:25:38.819187+010020494671A Network Trojan was detected192.168.2.949728185.208.158.20280TCP
        2024-11-15T17:25:39.884726+010020494671A Network Trojan was detected192.168.2.949729185.208.158.20280TCP
        2024-11-15T17:25:40.306930+010020494671A Network Trojan was detected192.168.2.949729185.208.158.20280TCP
        2024-11-15T17:25:41.060962+010020494671A Network Trojan was detected192.168.2.949729185.208.158.20280TCP
        2024-11-15T17:25:42.462478+010020494671A Network Trojan was detected192.168.2.949730185.208.158.20280TCP
        2024-11-15T17:25:42.876613+010020494671A Network Trojan was detected192.168.2.949730185.208.158.20280TCP
        2024-11-15T17:25:43.925251+010020494671A Network Trojan was detected192.168.2.949731185.208.158.20280TCP
        2024-11-15T17:25:44.959529+010020494671A Network Trojan was detected192.168.2.949732185.208.158.20280TCP
        2024-11-15T17:25:45.391480+010020494671A Network Trojan was detected192.168.2.949732185.208.158.20280TCP
        2024-11-15T17:25:46.443060+010020494671A Network Trojan was detected192.168.2.949733185.208.158.20280TCP
        2024-11-15T17:25:47.483529+010020494671A Network Trojan was detected192.168.2.949734185.208.158.20280TCP
        2024-11-15T17:25:48.509317+010020494671A Network Trojan was detected192.168.2.949735185.208.158.20280TCP
        2024-11-15T17:25:48.919795+010020494671A Network Trojan was detected192.168.2.949735185.208.158.20280TCP
        2024-11-15T17:25:50.004223+010020494671A Network Trojan was detected192.168.2.949736185.208.158.20280TCP
        2024-11-15T17:25:51.022745+010020494671A Network Trojan was detected192.168.2.949737185.208.158.20280TCP
        2024-11-15T17:25:51.435958+010020494671A Network Trojan was detected192.168.2.949737185.208.158.20280TCP
        2024-11-15T17:25:52.493124+010020494671A Network Trojan was detected192.168.2.949738185.208.158.20280TCP
        2024-11-15T17:25:52.911237+010020494671A Network Trojan was detected192.168.2.949738185.208.158.20280TCP
        2024-11-15T17:25:53.950270+010020494671A Network Trojan was detected192.168.2.949739185.208.158.20280TCP
        2024-11-15T17:25:54.992378+010020494671A Network Trojan was detected192.168.2.949740185.208.158.20280TCP
        2024-11-15T17:25:55.412025+010020494671A Network Trojan was detected192.168.2.949740185.208.158.20280TCP
        2024-11-15T17:25:56.446147+010020494671A Network Trojan was detected192.168.2.949741185.208.158.20280TCP
        2024-11-15T17:25:57.555761+010020494671A Network Trojan was detected192.168.2.949742185.208.158.20280TCP
        2024-11-15T17:25:57.976783+010020494671A Network Trojan was detected192.168.2.949742185.208.158.20280TCP
        2024-11-15T17:25:58.405379+010020494671A Network Trojan was detected192.168.2.949742185.208.158.20280TCP
        2024-11-15T17:25:59.440168+010020494671A Network Trojan was detected192.168.2.949743185.208.158.20280TCP
        2024-11-15T17:26:00.475281+010020494671A Network Trojan was detected192.168.2.949744185.208.158.20280TCP
        2024-11-15T17:26:01.253247+010020494671A Network Trojan was detected192.168.2.949744185.208.158.20280TCP
        2024-11-15T17:26:02.307033+010020494671A Network Trojan was detected192.168.2.949745185.208.158.20280TCP
        2024-11-15T17:26:03.346268+010020494671A Network Trojan was detected192.168.2.949746185.208.158.20280TCP
        2024-11-15T17:26:04.405876+010020494671A Network Trojan was detected192.168.2.949747185.208.158.20280TCP
        2024-11-15T17:26:05.453159+010020494671A Network Trojan was detected192.168.2.949748185.208.158.20280TCP
        2024-11-15T17:26:06.517400+010020494671A Network Trojan was detected192.168.2.949749185.208.158.20280TCP
        2024-11-15T17:26:07.553501+010020494671A Network Trojan was detected192.168.2.949750185.208.158.20280TCP
        2024-11-15T17:26:08.666118+010020494671A Network Trojan was detected192.168.2.949751185.208.158.20280TCP
        2024-11-15T17:26:09.093843+010020494671A Network Trojan was detected192.168.2.949751185.208.158.20280TCP
        2024-11-15T17:26:10.138651+010020494671A Network Trojan was detected192.168.2.949752185.208.158.20280TCP
        2024-11-15T17:26:11.177320+010020494671A Network Trojan was detected192.168.2.949753185.208.158.20280TCP
        2024-11-15T17:26:12.224964+010020494671A Network Trojan was detected192.168.2.949754185.208.158.20280TCP
        2024-11-15T17:26:12.645092+010020494671A Network Trojan was detected192.168.2.949754185.208.158.20280TCP
        2024-11-15T17:26:13.662002+010020494671A Network Trojan was detected192.168.2.949755185.208.158.20280TCP
        2024-11-15T17:26:14.714239+010020494671A Network Trojan was detected192.168.2.949756185.208.158.20280TCP
        2024-11-15T17:26:15.131551+010020494671A Network Trojan was detected192.168.2.949756185.208.158.20280TCP
        2024-11-15T17:26:16.173876+010020494671A Network Trojan was detected192.168.2.949757185.208.158.20280TCP
        2024-11-15T17:26:17.224984+010020494671A Network Trojan was detected192.168.2.949758185.208.158.20280TCP
        2024-11-15T17:26:18.272171+010020494671A Network Trojan was detected192.168.2.949759185.208.158.20280TCP
        2024-11-15T17:26:19.404347+010020494671A Network Trojan was detected192.168.2.949760185.208.158.20280TCP
        2024-11-15T17:26:20.440481+010020494671A Network Trojan was detected192.168.2.949761185.208.158.20280TCP
        2024-11-15T17:26:21.490160+010020494671A Network Trojan was detected192.168.2.949762185.208.158.20280TCP
        2024-11-15T17:26:22.570609+010020494671A Network Trojan was detected192.168.2.949763185.208.158.20280TCP
        2024-11-15T17:26:23.652674+010020494671A Network Trojan was detected192.168.2.949764185.208.158.20280TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: i7j22nof2Q.exeAvira: detected
        Source: avidenta32.exe.7624.6.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["bvubwie.com"]}
        Source: C:\ProgramData\epiAvidenta\epiAvidenta.exeReversingLabs: Detection: 66%
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeReversingLabs: Detection: 66%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
        Source: C:\ProgramData\epiAvidenta\epiAvidenta.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpCode function: 2_2_10001000 ISCryptGetVersion,2_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpCode function: 2_2_10001130 ArcFourCrypt,2_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeUnpacked PE file: 6.2.avidenta32.exe.400000.0.unpack
        Source: i7j22nof2Q.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Avidenta_is1Jump to behavior
        Source: i7j22nof2Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: msvcp71.pdbx# source: is-LE59V.tmp.2.dr
        Source: Binary string: msvcr71.pdb< source: is-7KSD8.tmp.2.dr
        Source: Binary string: msvcp71.pdb source: is-LE59V.tmp.2.dr
        Source: Binary string: msvcr71.pdb source: is-7KSD8.tmp.2.dr
        Source: Binary string: C:\KRAPPYSOFTWARE_CVS\KRAPPYSOFTWARE\Projects\Sparkle_Win\Release\WinSparkle.pdb source: is-FN75G.tmp.2.dr

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49713 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49726 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49721 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49719 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49722 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49710 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49711 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49720 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49731 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49734 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49735 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49729 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49733 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49725 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49738 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49716 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49723 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49740 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49718 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49736 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49717 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49727 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49739 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49747 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49742 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49741 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49715 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49748 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49737 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49724 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49750 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49730 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49753 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49756 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49732 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49761 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49743 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49762 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49754 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49759 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49760 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49746 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49758 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49763 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49752 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49749 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49757 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49764 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49755 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49744 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49751 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49745 -> 185.208.158.202:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.9:49728 -> 185.208.158.202:80
        Source: Malware configuration extractorURLs: bvubwie.com
        Source: global trafficTCP traffic: 192.168.2.9:49712 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.202 185.208.158.202
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed94 HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed94 HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 91.211.247.248
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CA72AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,_memset,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,_memset,_memset,_memset,_malloc,_memset,_strtok,_swscanf,_strtok,_free,Sleep,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_memset,_free,6_2_02CA72AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed94 HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed94 HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1Host: bvubwie.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: bvubwie.com
        Source: avidenta32.exe, 00000006.00000002.2628619554.00000000008B4000.00000004.00000020.00020000.00000000.sdmp, avidenta32.exe, 00000006.00000002.2628619554.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, avidenta32.exe, 00000006.00000002.2631281264.00000000034F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e4928
        Source: avidenta32.exe, 00000006.00000002.2631281264.00000000034E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.202/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: is-M49AS.tmp.2.drString found in binary or memory: http://vinylcut.co.za/activation
        Source: is-FN75G.tmp.2.drString found in binary or memory: http://winsparkle.org).
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.VinylCut.co.za
        Source: is-FN75G.tmp.2.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#os
        Source: is-FN75G.tmp.2.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLink
        Source: is-FN75G.tmp.2.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinktitledescriptionenclosureurlhttp
        Source: is-FN75G.tmp.2.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#shortVersionString
        Source: is-FN75G.tmp.2.drString found in binary or memory: http://www.andymatuschak.org/xml-namespaces/sparkle#version
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/createspace
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/createspace/activate.php?Dhttps://www.craftedge.com/activation/s
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/cut
        Source: is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/greatcut
        Source: is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/greatcut/activate.php?Ahttps://www.craftedge.com/activation/sure
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/magiccutdstudio/activate.php?Dhttps://www.craftedge.com/activati
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/magiccutstudio
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/scal
        Source: is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/scal/activate.php?Dhttps://www.craftedge.com/activation/surecuts
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/activation/smartprint/activate.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchase
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchase/ecal
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchase/ecal6http://www.craftedge.com/activation/ecal/activate.php??https:
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchase/ecal_Trial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchase/scalbridge
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchase/scalpro
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchase/smartprint.http://www.craftedge.com/activation/smartprintChttps://
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.com/purchaseUTrial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.comGTrial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.comNTrial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.craftedge.comPTrial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.easycutpro.com
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.easycutpro.com/store.html
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.easycutstudio.com
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.easycutstudio.com/buy.html
        Source: i7j22nof2Q.exe, 00000000.00000003.1375362709.00000000025D0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.exe, 00000000.00000003.1375838495.000000007FBE0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000000.1377434617.0000000000401000.00000020.00000001.01000000.00000004.sdmp, i7j22nof2Q.tmp.0.dr, is-J9CVV.tmp.2.drString found in binary or memory: http://www.innosetup.com/
        Source: i7j22nof2Q.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
        Source: is-M49AS.tmp.2.drString found in binary or memory: http://www.pss.co
        Source: i7j22nof2Q.exe, 00000000.00000003.1375362709.00000000025D0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.exe, 00000000.00000003.1375838495.000000007FBE0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000000.1377434617.0000000000401000.00000020.00000001.01000000.00000004.sdmp, i7j22nof2Q.tmp.0.dr, is-J9CVV.tmp.2.drString found in binary or memory: http://www.remobjects.com/ps
        Source: is-M49AS.tmp.2.drString found in binary or memory: http://www.signwarehouse.com
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.signwarehouse.comRTrial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.sizzix.com/ecallite#This
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.starcraftvinyl.com/activate
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.starcraftvinyl.com/create&http://www.starcraftvinyl.com/activate
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.starcraftvinyl.com/createDTrial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: http://www.vinylcut.co.za
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.VinylCut.co.za
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/cut/activate.php??https://www.craftedge.com/activation/surecuts
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/ecal3.php?(http://www.craftedge.com/activation/eca
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/ecal3.php??https://www.craftedge.com/activation/su
        Source: is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/ecal3_k.php?
        Source: is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/greatcutd.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scal6.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scal6.php??https://www.craftedge.com/activation/su
        Source: is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/scal6_k.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/skycut_kd.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/skycutd.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/starcut.php?Ahttps://www.craftedge.com/activation/
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/starcut_k.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/vinylcut5.php?Chttps://www.craftedge.com/activatio
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/vinylcut5_k.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/xfcut.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.craftedge.com/activation/surecutsalot/xfcut_k.php?
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.easycutpro.com/activation
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.easycutpro.com/activationGhttps://www.craftedge.com/activation/surecutsalot/easysigncutp
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.easycutpro.comOTrial
        Source: i7j22nof2Q.exe, 00000000.00000002.2628677786.0000000000B62000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.exe, 00000000.00000003.1374007300.00000000025D0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000003.1379482837.00000000033F0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000002.2629467522.0000000000A81000.00000004.00000020.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000002.2629963732.0000000002420000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
        Source: is-M49AS.tmp.2.drString found in binary or memory: https://www.gccwebshop.com
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.gccwebshop.comPTrial
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.xfcut.com/activation
        Source: avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drString found in binary or memory: https://www.xfcut.com/activation?https://www.craftedge.com/activation/surecutsalot/xfcut_kd.php?=htt
        Source: is-M49AS.tmp.2.drString found in binary or memory: https://www.xfcut.com/store

        System Summary

        barindex
        Source: avidenta32.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: epiAvidenta.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00401A4F: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,6_2_00401A4F
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_004010516_2_00401051
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00401C266_2_00401C26
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00406FB76_2_00406FB7
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CDB4E56_2_02CDB4E5
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CBE25D6_2_02CBE25D
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CAF0856_2_02CAF085
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CC4EF96_2_02CC4EF9
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CC2E846_2_02CC2E84
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CBE6756_2_02CBE675
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CB9F546_2_02CB9F54
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CC54706_2_02CC5470
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CBDD696_2_02CBDD69
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CBAD0A6_2_02CBAD0A
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CB85126_2_02CB8512
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Avidenta 2.8.8\CH375DLL.dll (copy) 3B578B15AD0D0747E8A3D958A0E7BF1FF6D5C335B8894FF7A020604DA008D79D
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: String function: 02CB8BB0 appears 37 times
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: String function: 02CC5400 appears 137 times
        Source: i7j22nof2Q.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: i7j22nof2Q.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: avidenta32.exe.2.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-J9CVV.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-J9CVV.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: epiAvidenta.exe.6.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: i7j22nof2Q.exe, 00000000.00000002.2628677786.0000000000B78000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs i7j22nof2Q.exe
        Source: i7j22nof2Q.exe, 00000000.00000003.1375362709.00000000025D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs i7j22nof2Q.exe
        Source: i7j22nof2Q.exe, 00000000.00000000.1373499783.00000000004B8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs i7j22nof2Q.exe
        Source: i7j22nof2Q.exe, 00000000.00000003.1375838495.000000007FBE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs i7j22nof2Q.exe
        Source: i7j22nof2Q.exeBinary or memory string: OriginalFileName vs i7j22nof2Q.exe
        Source: i7j22nof2Q.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal100.troj.evad.winEXE@10/57@1/2
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CB08D0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,6_2_02CB08D0
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: CreateServiceA,6_2_00402BAD
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00401F64 FindResourceA,GetLastError,SizeofResource,LoadResource,LockResource,GlobalAlloc,GetTickCount,GlobalAlloc,6_2_00401F64
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00402232 StartServiceCtrlDispatcherA,6_2_00402232
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00402232 StartServiceCtrlDispatcherA,6_2_00402232
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7572:120:WilError_03
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeFile created: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmpJump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: i7j22nof2Q.exeString found in binary or memory: /LOADINF="filename"
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeFile read: C:\Users\user\Desktop\i7j22nof2Q.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\i7j22nof2Q.exe "C:\Users\user\Desktop\i7j22nof2Q.exe"
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeProcess created: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp "C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp" /SL5="$20410,5992012,721408,C:\Users\user\Desktop\i7j22nof2Q.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" pause avidenta_11132
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause avidenta_11132
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess created: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe "C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe" -i
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeProcess created: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp "C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp" /SL5="$20410,5992012,721408,C:\Users\user\Desktop\i7j22nof2Q.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" pause avidenta_11132Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess created: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe "C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe" -iJump to behavior
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause avidenta_11132Jump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeSection loaded: netapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: netapi32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: winsta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: msftedit.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: windows.globalization.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: bcp47mrm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: globinputhost.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
        Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpWindow found: window name: TMainFormJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Avidenta_is1Jump to behavior
        Source: i7j22nof2Q.exeStatic file information: File size 6692550 > 1048576
        Source: i7j22nof2Q.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: msvcp71.pdbx# source: is-LE59V.tmp.2.dr
        Source: Binary string: msvcr71.pdb< source: is-7KSD8.tmp.2.dr
        Source: Binary string: msvcp71.pdb source: is-LE59V.tmp.2.dr
        Source: Binary string: msvcr71.pdb source: is-7KSD8.tmp.2.dr
        Source: Binary string: C:\KRAPPYSOFTWARE_CVS\KRAPPYSOFTWARE\Projects\Sparkle_Win\Release\WinSparkle.pdb source: is-FN75G.tmp.2.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeUnpacked PE file: 6.2.avidenta32.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeUnpacked PE file: 6.2.avidenta32.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00401B4B LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,6_2_00401B4B
        Source: i7j22nof2Q.exeStatic PE information: section name: .didata
        Source: i7j22nof2Q.tmp.0.drStatic PE information: section name: .didata
        Source: is-J9CVV.tmp.2.drStatic PE information: section name: .didata
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_0040D456 push ebp; iretd 6_2_0040D417
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_0040D672 push ebp; retf 6_2_0040D677
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_004024FE push esp; retf 6_2_00402523
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_004030B0 push eax; ret 6_2_004030DE
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_0040D35F push ebp; iretd 6_2_0040D417
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_0040B728 push eax; ret 6_2_0040B6D9
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_0040D3F0 push ebp; iretd 6_2_0040D417
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_0040B5AC push eax; ret 6_2_0040B6D9
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CDF872 push ebp; mov dword ptr [esp], eax6_2_02D109B9
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CE33C2 push 483A1830h; mov dword ptr [esp], edi6_2_02CFAA4F
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CE33C2 push edx; mov dword ptr [esp], ecx6_2_02CFAA68
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CE33C2 push ebp; mov dword ptr [esp], edi6_2_02CFAA6F
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CE33C2 push ebp; mov dword ptr [esp], 2584E63Bh6_2_02D16A2B
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02D28D68 push eax; mov dword ptr [esp], edi6_2_02D28D84
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02D28D68 push 0F92C0D1h; mov dword ptr [esp], eax6_2_02D28D9E
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02D28D68 push 1F441FD2h; mov dword ptr [esp], esp6_2_02D28DDC
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CDFAC5 push ebp; mov dword ptr [esp], ecx6_2_02CDFAEC
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02D0F34C push 4295A252h; mov dword ptr [esp], eax6_2_02D0F388
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CB8BF5 push ecx; ret 6_2_02CB8C08
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CAEF9D push ss; iretd 6_2_02CAEF9E
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CC545B push ecx; ret 6_2_02CC546B
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CA5463 push ebp; iretd 6_2_02CA546F
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CC5400 push eax; ret 6_2_02CC541E

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive06_2_00401A4F
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive06_2_02CAF8AE
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\cairogfx.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-AQBK0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Temp\is-4JJ7J.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeFile created: C:\ProgramData\epiAvidenta\epiAvidenta.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-P7A4S.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Temp\is-4JJ7J.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-FN75G.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\CH375DLL.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeFile created: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-7KSD8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\uninstall\is-J9CVV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-LE59V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpFile created: C:\Users\user\AppData\Local\Avidenta 2.8.8\WinSparkle.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeFile created: C:\ProgramData\epiAvidenta\epiAvidenta.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive06_2_00401A4F
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive06_2_02CAF8AE
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00402232 StartServiceCtrlDispatcherA,6_2_00402232
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CB8512 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_02CB8512
        Source: C:\Users\user\Desktop\i7j22nof2Q.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,6_2_00401B4B
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,6_2_02CAF9B2
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeWindow / User API: threadDelayed 9740Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\cairogfx.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-AQBK0.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-4JJ7J.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-P7A4S.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-4JJ7J.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-FN75G.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\CH375DLL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-7KSD8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\WinSparkle.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\is-LE59V.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\uninstall\is-J9CVV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Avidenta 2.8.8\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_6-19511
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe TID: 7628Thread sleep count: 132 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe TID: 7628Thread sleep time: -264000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe TID: 8056Thread sleep count: 58 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe TID: 8056Thread sleep time: -3480000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe TID: 7628Thread sleep count: 9740 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe TID: 7628Thread sleep time: -19480000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeThread delayed: delay time: 60000Jump to behavior
        Source: avidenta32.exe, 00000006.00000002.2628619554.00000000007FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
        Source: avidenta32.exe, 00000006.00000002.2631281264.00000000034E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeAPI call chain: ExitProcess graph end nodegraph_6-19512
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeAPI call chain: ExitProcess graph end nodegraph_6-19981
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_6-21992
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CC01CE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,6_2_02CC01CE
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CC01CE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,6_2_02CC01CE
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_00401B4B LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,6_2_00401B4B
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CA648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,6_2_02CA648B
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CB9538 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_02CB9538
        Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause avidenta_11132Jump to behavior
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_02CAF866 cpuid 6_2_02CAF866
        Source: C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exeCode function: 6_2_0040D1C8 GetLocalTime,6_2_0040D1C8
        Source: C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmpCode function: 2_2_10001000 ISCryptGetVersion,2_2_10001000

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000006.00000002.2630520865.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: avidenta32.exe PID: 7624, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000006.00000002.2630520865.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: avidenta32.exe PID: 7624, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Native API
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        5
        Windows Service
        5
        Windows Service
        2
        Obfuscated Files or Information
        LSASS Memory23
        System Information Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Service Execution
        1
        Bootkit
        11
        Process Injection
        2
        Software Packing
        Security Account Manager241
        Security Software Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS1
        Process Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Masquerading
        LSA Secrets121
        Virtualization/Sandbox Evasion
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Application Window Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
        Process Injection
        DCSync2
        System Owner/User Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Bootkit
        Proc Filesystem1
        Remote System Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
        System Network Configuration Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 1556586 Sample: i7j22nof2Q.exe Startdate: 15/11/2024 Architecture: WINDOWS Score: 100 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 10 other signatures 2->46 8 i7j22nof2Q.exe 2 2->8         started        process3 file4 24 C:\Users\user\AppData\...\i7j22nof2Q.tmp, PE32 8->24 dropped 11 i7j22nof2Q.tmp 18 39 8->11         started        process5 file6 26 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 11->26 dropped 28 C:\Users\user\AppData\...\unins000.exe (copy), PE32 11->28 dropped 30 C:\Users\user\AppData\Local\...\is-J9CVV.tmp, PE32 11->30 dropped 32 12 other files (7 malicious) 11->32 dropped 14 avidenta32.exe 1 19 11->14         started        18 net.exe 1 11->18         started        process7 dnsIp8 36 bvubwie.com 185.208.158.202, 49710, 49711, 49713 SIMPLECARRER2IT Switzerland 14->36 38 89.105.201.183, 2023, 49712, 49714 NOVOSERVE-ASNL Netherlands 14->38 34 C:\ProgramData\epiAvidenta\epiAvidenta.exe, PE32 14->34 dropped 20 conhost.exe 18->20         started        22 net1.exe 1 18->22         started        file9 process10

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        i7j22nof2Q.exe100%AviraHEUR/AGEN.1332534
        SourceDetectionScannerLabelLink
        C:\ProgramData\epiAvidenta\epiAvidenta.exe100%Joe Sandbox ML
        C:\ProgramData\epiAvidenta\epiAvidenta.exe67%ReversingLabsWin32.Trojan.Ekstak
        C:\Users\user\AppData\Local\Avidenta 2.8.8\CH375DLL.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\WinSparkle.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe67%ReversingLabsWin32.Trojan.Ekstak
        C:\Users\user\AppData\Local\Avidenta 2.8.8\cairogfx.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\is-7KSD8.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\is-AQBK0.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\is-FN75G.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\is-LE59V.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\is-P7A4S.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\msvcp71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\msvcr71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\uninstall\is-J9CVV.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Avidenta 2.8.8\uninstall\unins000.exe (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-4JJ7J.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-4JJ7J.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://www.craftedge.com/activation/cut/activate.php??https://www.craftedge.com/activation/surecuts0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#shortVersionString0%Avira URL Cloudsafe
        https://www.gccwebshop.com0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#os0%Avira URL Cloudsafe
        http://www.signwarehouse.comRTrial0%Avira URL Cloudsafe
        http://vinylcut.co.za/activation0%Avira URL Cloudsafe
        https://www.easycutpro.com/activation0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLink0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/smartprint/activate.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/greatcut/activate.php?Ahttps://www.craftedge.com/activation/sure0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/ecal3.php??https://www.craftedge.com/activation/su0%Avira URL Cloudsafe
        https://www.easycutpro.com/activationGhttps://www.craftedge.com/activation/surecutsalot/easysigncutp0%Avira URL Cloudsafe
        http://www.craftedge.comNTrial0%Avira URL Cloudsafe
        https://www.VinylCut.co.za0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/ecal_Trial0%Avira URL Cloudsafe
        http://www.craftedge.comGTrial0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase0%Avira URL Cloudsafe
        http://bvubwie.com/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/vinylcut5.php?Chttps://www.craftedge.com/activatio0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/skycut_kd.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/magiccutstudio0%Avira URL Cloudsafe
        http://www.signwarehouse.com0%Avira URL Cloudsafe
        http://www.easycutpro.com0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scal6_k.php?0%Avira URL Cloudsafe
        https://www.xfcut.com/activation0%Avira URL Cloudsafe
        https://www.gccwebshop.comPTrial0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/ecal3.php?(http://www.craftedge.com/activation/eca0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scal6.php??https://www.craftedge.com/activation/su0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/scalbridge0%Avira URL Cloudsafe
        http://www.starcraftvinyl.com/create&http://www.starcraftvinyl.com/activate0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/scal6.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/scalpro0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/starcut_k.php?0%Avira URL Cloudsafe
        http://www.starcraftvinyl.com/activate0%Avira URL Cloudsafe
        http://www.VinylCut.co.za0%Avira URL Cloudsafe
        https://www.xfcut.com/activation?https://www.craftedge.com/activation/surecutsalot/xfcut_kd.php?=htt0%Avira URL Cloudsafe
        http://www.easycutstudio.com/buy.html0%Avira URL Cloudsafe
        https://www.easycutpro.comOTrial0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinktitledescriptionenclosureurlhttp0%Avira URL Cloudsafe
        https://www.xfcut.com/store0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/greatcut0%Avira URL Cloudsafe
        http://www.craftedge.comPTrial0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/createspace0%Avira URL Cloudsafe
        http://www.easycutpro.com/store.html0%Avira URL Cloudsafe
        https://www.craftedge.com/activation0%Avira URL Cloudsafe
        http://www.andymatuschak.org/xml-namespaces/sparkle#version0%Avira URL Cloudsafe
        http://winsparkle.org).0%Avira URL Cloudsafe
        http://bvubwie.com/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed940%Avira URL Cloudsafe
        http://185.208.158.202/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/xfcut.php?0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/greatcutd.php?0%Avira URL Cloudsafe
        http://185.208.158.202/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e49280%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/ecal3_k.php?0%Avira URL Cloudsafe
        http://www.starcraftvinyl.com/createDTrial0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/scal0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/xfcut_k.php?0%Avira URL Cloudsafe
        bvubwie.com0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/smartprint.http://www.craftedge.com/activation/smartprintChttps://0%Avira URL Cloudsafe
        http://www.craftedge.com0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/skycutd.php?0%Avira URL Cloudsafe
        http://www.craftedge.com/purchaseUTrial0%Avira URL Cloudsafe
        http://www.easycutstudio.com0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/scal/activate.php?Dhttps://www.craftedge.com/activation/surecuts0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/vinylcut5_k.php?0%Avira URL Cloudsafe
        http://www.sizzix.com/ecallite#This0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/magiccutdstudio/activate.php?Dhttps://www.craftedge.com/activati0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/cut0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/ecal0%Avira URL Cloudsafe
        http://www.pss.co0%Avira URL Cloudsafe
        https://www.craftedge.com/activation/surecutsalot/starcut.php?Ahttps://www.craftedge.com/activation/0%Avira URL Cloudsafe
        http://www.craftedge.com/activation/createspace/activate.php?Dhttps://www.craftedge.com/activation/s0%Avira URL Cloudsafe
        https://www.easycutstudio.com/support.html0%Avira URL Cloudsafe
        http://www.craftedge.com/purchase/ecal6http://www.craftedge.com/activation/ecal/activate.php??https:0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        bvubwie.com
        185.208.158.202
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://bvubwie.com/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cctrue
          • Avira URL Cloud: safe
          unknown
          http://bvubwie.com/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed94true
          • Avira URL Cloud: safe
          unknown
          bvubwie.comtrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.gccwebshop.comis-M49AS.tmp.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://vinylcut.co.za/activationis-M49AS.tmp.2.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.easycutpro.com/activationavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.andymatuschak.org/xml-namespaces/sparkle#shortVersionStringis-FN75G.tmp.2.drfalse
          • Avira URL Cloud: safe
          unknown
          https://www.craftedge.com/activation/cut/activate.php??https://www.craftedge.com/activation/surecutsavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinkis-FN75G.tmp.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.craftedge.com/activation/greatcut/activate.php?Ahttps://www.craftedge.com/activation/sureis-M49AS.tmp.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUi7j22nof2Q.exefalse
            high
            http://www.andymatuschak.org/xml-namespaces/sparkle#osis-FN75G.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.signwarehouse.comRTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/activation/smartprint/activate.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/vinylcut5.php?Chttps://www.craftedge.com/activatioavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.comNTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.easycutpro.com/activationGhttps://www.craftedge.com/activation/surecutsalot/easysigncutpavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.VinylCut.co.zaavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/ecal3.php??https://www.craftedge.com/activation/suavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchaseavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchase/ecal_Trialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.comGTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/skycut_kd.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/activation/magiccutstudioavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.signwarehouse.comis-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.easycutpro.comavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scal6_k.php?is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.gccwebshop.comPTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/ecal3.php?(http://www.craftedge.com/activation/ecaavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scal6.php??https://www.craftedge.com/activation/suavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.xfcut.com/activationavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchase/scalbridgeavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.starcraftvinyl.com/create&http://www.starcraftvinyl.com/activateavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/scal6.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.craftedge.com/activation/surecutsalot/starcut_k.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.craftedge.com/purchase/scalproavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.VinylCut.co.zaavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.easycutstudio.com/buy.htmlavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.starcraftvinyl.com/activateavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.xfcut.com/activation?https://www.craftedge.com/activation/surecutsalot/xfcut_kd.php?=httavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.andymatuschak.org/xml-namespaces/sparkle#releaseNotesLinktitledescriptionenclosureurlhttpis-FN75G.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.easycutpro.comOTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            https://www.xfcut.com/storeis-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.andymatuschak.org/xml-namespaces/sparkle#versionis-FN75G.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.easycutpro.com/store.htmlavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.innosetup.com/i7j22nof2Q.exe, 00000000.00000003.1375362709.00000000025D0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.exe, 00000000.00000003.1375838495.000000007FBE0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000000.1377434617.0000000000401000.00000020.00000001.01000000.00000004.sdmp, i7j22nof2Q.tmp.0.dr, is-J9CVV.tmp.2.drfalse
              high
              http://www.craftedge.com/activation/createspaceavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/activation/greatcutis-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://185.208.158.202/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82davidenta32.exe, 00000006.00000002.2631281264.00000000034E2000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.comPTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://winsparkle.org).is-FN75G.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.craftedge.com/activationavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.craftedge.com/activation/surecutsalot/xfcut.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.craftedge.com/activation/surecutsalot/greatcutd.php?is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://185.208.158.202/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e4928avidenta32.exe, 00000006.00000002.2628619554.00000000008B4000.00000004.00000020.00020000.00000000.sdmp, avidenta32.exe, 00000006.00000002.2628619554.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, avidenta32.exe, 00000006.00000002.2631281264.00000000034F1000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.starcraftvinyl.com/createDTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/activation/scalavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.craftedge.com/activation/surecutsalot/ecal3_k.php?is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/purchase/smartprint.http://www.craftedge.com/activation/smartprintChttps://avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.craftedge.com/activation/surecutsalot/xfcut_k.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.comavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.craftedge.com/activation/surecutsalot/skycutd.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/purchaseUTrialavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/activation/scal/activate.php?Dhttps://www.craftedge.com/activation/surecutsis-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.easycutstudio.comavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.craftedge.com/activation/magiccutdstudio/activate.php?Dhttps://www.craftedge.com/activatiavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.vinylcut.co.zaavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                unknown
                https://www.craftedge.com/activation/surecutsalot/vinylcut5_k.php?avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sizzix.com/ecallite#Thisavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.pss.cois-M49AS.tmp.2.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.com/purchase/ecalavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.craftedge.com/activation/surecutsalot/starcut.php?Ahttps://www.craftedge.com/activation/avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.com/activation/cutavidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.craftedge.com/activation/createspace/activate.php?Dhttps://www.craftedge.com/activation/savidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.remobjects.com/psi7j22nof2Q.exe, 00000000.00000003.1375362709.00000000025D0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.exe, 00000000.00000003.1375838495.000000007FBE0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000000.1377434617.0000000000401000.00000020.00000001.01000000.00000004.sdmp, i7j22nof2Q.tmp.0.dr, is-J9CVV.tmp.2.drfalse
                  high
                  https://www.easycutstudio.com/support.htmli7j22nof2Q.exe, 00000000.00000002.2628677786.0000000000B62000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.exe, 00000000.00000003.1374007300.00000000025D0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000003.1379482837.00000000033F0000.00000004.00001000.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000002.2629467522.0000000000A81000.00000004.00000020.00020000.00000000.sdmp, i7j22nof2Q.tmp, 00000002.00000002.2629963732.0000000002420000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.craftedge.com/purchase/ecal6http://www.craftedge.com/activation/ecal/activate.php??https:avidenta32.exe, 00000006.00000000.1406515191.0000000000638000.00000002.00000001.01000000.00000008.sdmp, avidenta32.exe.2.dr, epiAvidenta.exe.6.dr, is-M49AS.tmp.2.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.208.158.202
                  bvubwie.comSwitzerland
                  34888SIMPLECARRER2ITtrue
                  89.105.201.183
                  unknownNetherlands
                  24875NOVOSERVE-ASNLfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1556586
                  Start date and time:2024-11-15 17:23:14 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 57s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:12
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:i7j22nof2Q.exe
                  renamed because original name is a hash value
                  Original Sample Name:ad01c8fa6ec2371dfd9f57200f84e13a.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@10/57@1/2
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 82%
                  • Number of executed functions: 60
                  • Number of non-executed functions: 82
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target i7j22nof2Q.tmp, PID 7504 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: i7j22nof2Q.exe
                  TimeTypeDescription
                  11:24:55API Interceptor367376x Sleep call for process: avidenta32.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  185.208.158.202file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                    file.exeGet hashmaliciousSocks5SystemzBrowse
                      file.exeGet hashmaliciousSocks5SystemzBrowse
                        file.exeGet hashmaliciousSocks5SystemzBrowse
                          gxjIKuKnu7.exeGet hashmaliciousSocks5SystemzBrowse
                            OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                              BJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Socks5Systemz, Stealc, VidarBrowse
                                  G4G14X6zxY.exeGet hashmaliciousSocks5SystemzBrowse
                                    K5G8ehb2X4.exeGet hashmaliciousSocks5SystemzBrowse
                                      89.105.201.183OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 404
                                      N6jsQ3XNNX.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 200
                                      cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 200
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      SIMPLECARRER2ITfile.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                      • 185.208.158.202
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.202
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.202
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.202
                                      http://www.intelliclicksoftware.net/clicktrack2/click.aspx?ActionType=CreateHistory&CustomerID=GM-CSATRANS&ParentRecordID=&Campaign=Thank%20You%20For%20Your%20Business%20SR&Name=&Company=&Phone=&Email=&Subject=Click%20Through&WebNav=True&URL=http://johnvugrin.comGet hashmaliciousHTMLPhisherBrowse
                                      • 185.196.8.148
                                      gxjIKuKnu7.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.202
                                      https://www.imap.ne.jp/banner_click/add/20/1/?a&url=http://uniteseoul.comGet hashmaliciousHTMLPhisherBrowse
                                      • 185.208.158.9
                                      OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.202
                                      BJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.202
                                      file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Socks5Systemz, Stealc, VidarBrowse
                                      • 185.208.158.202
                                      NOVOSERVE-ASNLfile.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                      • 89.105.201.183
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      gxjIKuKnu7.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      OFjT8HmzFJ.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      BJqvg1iEdr.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Socks5Systemz, Stealc, VidarBrowse
                                      • 89.105.201.183
                                      G4G14X6zxY.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      K5G8ehb2X4.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 89.105.201.183
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\Avidenta 2.8.8\CH375DLL.dll (copy)file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                        file.exeGet hashmaliciousSocks5SystemzBrowse
                                          file.exeGet hashmaliciousSocks5SystemzBrowse
                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, Zhark RATBrowse
                                                gxjIKuKnu7.exeGet hashmaliciousSocks5SystemzBrowse
                                                  NBoJCkvcb1.exeGet hashmaliciousBabadeda SystemBCBrowse
                                                    Process:C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    File Type:ISO-8859 text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):8
                                                    Entropy (8bit):2.0
                                                    Encrypted:false
                                                    SSDEEP:3:JB:j
                                                    MD5:9E18E2301D9F3939E1880C61A34E1D45
                                                    SHA1:4DA7060DFC815D567FA775B587CF2163A05DED0C
                                                    SHA-256:7D23B62606F919BABEC65E464CFE778372F58B9DA2309FA8FE5870BAB1220F93
                                                    SHA-512:51939494DD275D4063FD0D3B71FDF01811D43EC0085FA96F7C9C5E69BED8885DEDC4770A10C2B3B053DD14EED6188E8A127F965DADFFC5BD50B3C884E66B45D1
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:.u7g....
                                                    Process:C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4
                                                    Entropy (8bit):0.8112781244591328
                                                    Encrypted:false
                                                    SSDEEP:3:B:B
                                                    MD5:B1DD6CE1962B44284E65236B55569647
                                                    SHA1:431843DD3CC038DAD438BD24384025DBC2A56BB7
                                                    SHA-256:BA8C9EAC092A503E4FB70771C34A00C5BB651043DE24DB4D3525EBBB3EE7FF08
                                                    SHA-512:3094130EEC92FF403E7529287BA26EF0AFF8A9BB77572B0CCBD143CCFB2B4FC2175AD8D6137559475C78418C33C253A87F5462E9C6430D463540250CABE110E2
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:F...
                                                    Process:C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):128
                                                    Entropy (8bit):2.9545817380615236
                                                    Encrypted:false
                                                    SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                    MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                    SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                    SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                    SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                    Process:C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):128
                                                    Entropy (8bit):1.7095628900165245
                                                    Encrypted:false
                                                    SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                    MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                    SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                    SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                    SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                    Malicious:false
                                                    Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3805184
                                                    Entropy (8bit):6.981118512863489
                                                    Encrypted:false
                                                    SSDEEP:49152:8vEFI1Qof0vYjuVdAHf73Or2+595THLZHePIoIrIk7jsIJq4qXMnF89:8vEFaQjAjuYHf7erx5TNepUJ
                                                    MD5:5F301B2942D42D35402C384009767E5F
                                                    SHA1:CF7A22C7C4A3C535B1B76D8B4FD5E17B3166FF44
                                                    SHA-256:7909A486FB464E8332395296B6D1930B0B2E2B008BBA1E68B696D315BC5B3323
                                                    SHA-512:9BF15BC5D25853AA66FDD88B1464CAC2D1D58AE556BBD53506FEBA88DF52A775835A4EC7D1AAA1A00414044C87C2299298D1D9DC5CEA91125574C63BD789307B
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 67%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:U.L.................."..h......@."......."...@..........................p:.......:.....................................$.".......#.X.............................................................................".L............................text.....".......".................`....rdata........".......".............@..@.data....c....#..0....".............@....rsrc.........#......(#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):15864
                                                    Entropy (8bit):5.446150628226878
                                                    Encrypted:false
                                                    SSDEEP:384:zVQEjoZ7ooLzDCccymQx/9DSpNAJemtjf0Ncl08:zV1joxLH1SpKJtTF08
                                                    MD5:43F2BC6828B177477C2F98B8973460E8
                                                    SHA1:F0A3C975346AF66A843E8B49574DC9083CD32E02
                                                    SHA-256:3B578B15AD0D0747E8A3D958A0E7BF1FF6D5C335B8894FF7A020604DA008D79D
                                                    SHA-512:2449C3D615E5BCECE4C1B773FE629A75061A3E1488F6D3D743D7D209F1D687F26997937AB13B3A1B89B650D122DB030D2188E1E89BC1AB03CF2DF9A29CAA456C
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: gxjIKuKnu7.exe, Detection: malicious, Browse
                                                    • Filename: NBoJCkvcb1.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................l.......^...............Rich............PE..L.....C (.........!.........................0....@..........................`......B}...............................'.......$..P....@..H....................P..<.......T...............................................|............................text............................... ..`.data........0....... ..............@....rsrc...H....@......."..............@..@.reloc.......P.......&..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):56223
                                                    Entropy (8bit):7.675938408908281
                                                    Encrypted:false
                                                    SSDEEP:1536:/+jsHu4IMEuSznazX2TQZwm+WxhM6HMy6Z7:/ppIMEulGTuwmXhMwMB
                                                    MD5:619CA288DE840F0BEC52218DB7F2036C
                                                    SHA1:D1D5389AAE91284734F4940BD8319CFA2BC40A0D
                                                    SHA-256:C2A6D78B635CA45E316D10936EF7507B1643F4674BAA08B79FE22285EADC3966
                                                    SHA-512:4FACBC40E37F9801E9177A057D55BF236C5FBCE5397AF973B60B21C027AB258FD1A91B893F93AE3100A6785AD67089FBF623C121B7D4990A987A311E47314E5C
                                                    Malicious:false
                                                    Preview:BSCAL...............)...............................................$..G..............4........=.......~L..`.....U........n........y.......T............O....W...%....|...b............z................DSCAL...............................|.1..%.[.B=l.8....I9s\QP2..?..U.G....."....7..[d.b...6.,J]./;[.{T....*bV....$G.M......../T..5y............w.5.y...N...:.,.y..k.........0....0........Arrows.Craft Edge.Shapes..........8.....8"...`...............................DSCAL................................ u..d[........P.[..Y5eD..w..s.5~.._.Ev\.,o...E.......}5..3J..6.6E<W|.....6.[..s..... .@zc.X.f....I.........R.f..x.T.....A.........1....1..."....Arrow 1.Craft Edge.Shapes..........8.....8....`.........Arrow 1.d.d......PNG........IHDR...d...d.....p.T....bKGD.............AIDATx...KHT{....c.$......l..g(...DP..4.@#h.Zd.,.!Y..R8.P..&.EFa..I.E....K."....t..v.v.uG...2.....A_..9z,B.4....Po@|O.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(&,...v.......C..Phii....7o.P[[..h......
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):132979
                                                    Entropy (8bit):7.662743912764236
                                                    Encrypted:false
                                                    SSDEEP:3072:viQWV2mUue1Kkp5F8U4rpAzmYDbUabHidS42O9mR:vTWa91dFr4rpwnUTdF2O6
                                                    MD5:F88752DB58C53A82F2DCD5D11F8233AB
                                                    SHA1:6D41999B017AD74783339AD00E03811F48A60E97
                                                    SHA-256:8B5AD9F2E46D3331989887761AFB6C3C7786BCA8D846444BF2FF234FD4E0E2DD
                                                    SHA-512:86350CC5DB773D092BFBDCB5710E90391ECE9D243E16706CD17E62197683520478FD32C2D4036DF45AF9326F59BF263A7FF7E56C662BEC5AA3960F6328852A00
                                                    Malicious:false
                                                    Preview:BSCAL.......................-......4........S....:.................!)........6.._....C<..>.....D......./S........\........b..i.....z.......W........j........f...-.................I........v....c...9......................J........*$........0..r.....;..&.....G..B.....M........Z........^........b..x....%v...........o....U...W................./........U.................;......................p................. .................a.......DSCAL..........................@...5.2N33....^m...n-.C0O.i.!w.2G.,.".).22.............a{[X ..N.>...{.,.W..0...{.]F<{a<f~....+.=...sj....M.,.<..z.(~.V.2|i....{j.(..C.'..`..]......R...Ex2...H.N.............6....6........Basic Shapes.Craft Edge.Shapes................."...`...............................DSCAL..........................@...3..k33....^m...n-.C0O.i.!w.2G.,.".).22|..B..[k.3..Y.....B..q..}4..X<.96H.. v..N...Nr......@......ss#%.\.:.g.3..4..$.e..3...3.....bd..c.<:.....L.t..... ...y.Y...................F....Arch.Craft Edge.Shapes...........
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):543833
                                                    Entropy (8bit):7.50496335178111
                                                    Encrypted:false
                                                    SSDEEP:6144:9DQ1236dLlSmlgZOw9/+wdM0zOyJromlIK1Z7HsH1GpYMnhdjYnDf67:dx6dLk/xSc+6sV8YIhdkDf67
                                                    MD5:7D692438B7E70DE932BC386A3D44D319
                                                    SHA1:5FC91DF8EA79A005A8583DCF44E0D48B7EC5A90F
                                                    SHA-256:05CB2D622DDEED62E052B8BBDB19DBE99B83F44F4447408601823B518D330586
                                                    SHA-512:1A605B25724B91BE5802104BC8BAA0C4EB0A3638CFD84D8AECFF10FC41B72BFD44DDD8DA34373C1BB8B7C8D4823D222441E0CFAF9696B8F119F8BEA37ED9724D
                                                    Malicious:false
                                                    Preview:BSCAL.......................4......D....6........'...j0....H..b........x....k........T...G%....9..}0....j...........]....r...N..................2...x...#............./...:9...iJ...F............k........d...z................-.................d...."............S....%...........................)..=.....7........B..@.....]........o..E....;....A...+...09...[....2..../..y....];........J.......WX........e........r......._...2........L........'.......=k....<..o^........Q.......<........A........r..DSCAL........@a"-..............@......v33....^m...n-.C0O.i.!w.2G.,.".).22.....N%....;.b7.P....G...1.u...iD..........A...[ys.@..zX.m.j.Y~....y...K<....n.l.......L...P..=......@...@.A4...t.@"..*z..........F....F........Createinspain Designs.Craft Edge.Miscellaneous..........4.....4....`...............................DSCAL..........................@.....r33....^m...n-.C0O.i.!w.2G.,.".).22.,"...~u..@....7.p.m.Q.&?@..d.>........ <"..-.`2@...aM.....+,..<........Sm.9....C.O.5p.Q..c....*
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):81816
                                                    Entropy (8bit):7.707519991934002
                                                    Encrypted:false
                                                    SSDEEP:1536:bsicsYedzR8eO9gKbvL2aiWqAIqwsoxlprW+DWu8UYHI7zoZ8jPy74RSBsZ:7p/dG9Bbz2DWqA1w7jKGWY3oujfRSBsZ
                                                    MD5:4C1F9B5ECF86DC7B839BF5D8F3ADFDC0
                                                    SHA1:CC6D1748BD0FFBB9036C0D871EC894E59B1CD6FC
                                                    SHA-256:F2A2A3C04FB8E6E9467A62B408F705D77C9A4269B2ADF5EC1947A871A0D1C4F9
                                                    SHA-512:C49470EBA77A8616E7CE32CFE8DA98010635BDA0046BD8904328D11777162DE9774635F20627A772F24719DA3C7E217CDEB8A8ED41BBD71B04C722D6F0E217AB
                                                    Malicious:false
                                                    Preview:BSCAL.....................y.................#..............%..F.....D...(....m................X...x........q....A...`..................%...H...P$..DSCAL.................................`..xG{0.G.N.X..)_...j.QW...K. t.{.L..!'.%=.....I..bE..|&..N2..!..s..c..x6..../D..c.=FEY....J..7.V.Q...>j..:.B......5....p.........................Fall.Craft Edge.Shapes..........9.....9!...`...............................DSCAL.................................l.........H.ES..5.....P.Qo{.=...T...*-.\X.h.5|S9.<...frt..N.k.n.-.2...-.,...M......!.B{.`n...~O.d..l.5......f.V..4BZ. ............/..../...7....Acorn.Craft Edge.Shapes..........9.....9....`.v.......Acorn.d.d.c....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{|S...I.$M....By....E(.D...Zqt....yl...{.P.|.6...G......+.V@..@'..h...B.i.4..q...!V..7.....49.{.o...{.2A........@._G...H..'.i.............].kF....W......@.dP...=QT..<8y.o.."..&.^Haa!3.N"g......w{..mJJ.."%%%h..V....g.sS...d.D...t..j.S1..k!UUU...'..7?.F
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):66594
                                                    Entropy (8bit):7.800838697373916
                                                    Encrypted:false
                                                    SSDEEP:1536:bOqndgG+IQ32TpUJz0DXmKTmg9usUFSZVl:bvQ3216zuXlFZVl
                                                    MD5:DE2D8D73F85285535A13F89B0F904847
                                                    SHA1:A4A42EB9FA7F9C8A51CD24560D999163DEE57290
                                                    SHA-256:306F7E5AFA1685939708DBBDAC6A0DD91DFE7C106BA6F84780BE9E44656B775B
                                                    SHA-512:CD1E87D933E8E821769721A1B03E244655D519722329E114388FD5E18F4DA57DAA7D2E769379C4938BA8F958AA71A87FD1DA194967A57EF5B94AA3347ECB8D29
                                                    Malicious:false
                                                    Preview:BSCAL.....................y...............................>!..M.....-..&.....I..).....Z........y..H......................}.........................DSCAL..............................4..a.A...;..l..0=a..S^[{.. ....D.2R..[N.HFm.qA%.D1E..<..~....i...e....R....O...`@...{P.....PAn|...J.......'I.4|0.....]H..I!D..........................Game.Craft Edge.Shapes..........9.....9....`...............................DSCAL....................................V.%....w$..g.....n..p.~......5W...Wi;..O.-.T..6T.,...(*..........*.......l<|....<...A.F_......`..).v.;....:.Q.........................Club.Craft Edge.Shapes..........9.....9.7..`.........Club.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{....?.......rY..0.PX..X.07...\.r..Fc.. .0.$>....ZIU....h..(r....-., ..B..X.X.1;....ced....L...g.t......9.....;..y..(..|7..466r..a..9..'.4..02....X,.......`.aD".<..g.. ..g...x..j.ne....E$.A.$<...<...q\$ID.....$Ix..e.$.I..(..g.iL.<........|.....q...x..
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):595545
                                                    Entropy (8bit):7.0713050562667386
                                                    Encrypted:false
                                                    SSDEEP:12288:fTBZLFkAEYvIfNLmu2cTbZqSNTuh4kMjBUJ84Ch9ycd8sl:f7LgLF2cbZtNT+sjOJXCrgsl
                                                    MD5:3695D419AA9C7B11C464BE2A58A40530
                                                    SHA1:C73513DF0555DB421EF81EF436136E53CCF4EE11
                                                    SHA-256:0487C6C64C185AC5BF459A907F302E363E5A162081B651570E691B3EA07818DD
                                                    SHA-512:54883F5E76E2208856F07DC16C9E5BCEA3ACBDA7C4B9CE48BF043CC371AD57F2925DCB6360CA85F5725609FC692906546B6E5BF70D8F839A206E06316C9E2F59
                                                    Malicious:false
                                                    Preview:BSCAL.......................2......H....(...........w....r...&?........E...cI...2....|...D........!................."....#...)....M...2............c....-........"........X...JW...*.......4........+........n...BQ..."....s...5...U...5/........@...8....M....f...2.......d*...a........1....+...3...j'....D...,...Kq.../...(....!.......b....H...~.........-...u<.......{R..r.....j..@....-....B........*......../...."..\$....G........`..].....y...(.......5............k... "...........DSCAL..........................@......d33....^m...n-.C0O.i.!w.2G.,.".).22...S...V.P...~).......PJ...._..q..7.4..l...}.........^M.rY......".L..+...|.X.....)...i..B...+~i..s.82.X........x.9..(M..L.........J....J........MichelleMyBelle Creations.Craft Edge.Miscellaneous..........;.....;B...`...............................DSCAL..........................@...c..#33....^m...n-.C0O.i.!w.2G.,.".).22.F..`m`..XJh9u..pFdCp%.R..9z.n...Qe.. 3.{,"....,`.9.+.5.D........vr..72#..s.U.y"[.6...h.3M. 2O..x.f.Ah.`.L.9...
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):44241
                                                    Entropy (8bit):7.747233988337866
                                                    Encrypted:false
                                                    SSDEEP:768:tZh3JPKW648iSo736Az5jwwcFuyZ3Y1Lnhe5xaLZPTAXogkA1sywv6:thPKz4/7h6fZ3Y1LhqxaB0Xrkosfv6
                                                    MD5:561A63F0CD4A70F3134143A5E266E58D
                                                    SHA1:18F871AE3532B1F9A030EBF2EEE7AA7A4491D60C
                                                    SHA-256:7C1B0B11EBF37D03AE2F6CF5135593D604BC1D3BF942329A3952DC0CCB770769
                                                    SHA-512:52F15AE1794120CA3E7E6204A4AEC9364BB8EBF7BF446753C53E8B5232BD7F76114603DABF41562318903EBEBB5390CDC4E651CDB33350AC5F3C0BDEDBBE3594
                                                    Malicious:false
                                                    Preview:BSCAL.....................g........,.............Q........0........(,.......19........B..C.....W........_........t..Y$...'.......DSCAL..........................@...Ps..33....^m...n-.C0O.i.!w.2G.,.".).22.4....Q....<.^..]e..!..G`......E..B..,..O..ev.b.....j P[Oc. ?1o65.O..r.dp.X.....7..O*B...p.Q..pU....e<...4X.H...uU4J*?.........................Music.Craft Edge.Music.................0'..`...............................DSCAL........`.................@....:.<33....^m...n-.C0O.i.!w.2G.,.".).22.P...A....^.M._.Z.vpMD<.Z.i+..\:.v......."...o...E.5..W.......M).....@.....K....~.t(.y...T.S......6~..hx..~w.=..d.3'.............4....4........Double Note.Craft Edge.Music................. ...`.........Double Note.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..ML....}..v.n.Xy..iS..h<j8.1x.111.x0^L..M.zQ.&..$....1..'.....H./@)..R.ei;...o.R...:...v..<;...4.Q.B...-u....p..`..`..@....p.\+.cB..,................ ...099.o...8.<.B...(^.x.....e1!.J.099.@ .@ .`0
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):76044
                                                    Entropy (8bit):7.781593198930996
                                                    Encrypted:false
                                                    SSDEEP:1536:9zCUsvuDmEm7KAaAJB2x56SPCwlkmsKpUaYVRMguAIXSA2:9z/s2Vm7KAajfl/sKpUaYVRM8YSf
                                                    MD5:FA20A58E0C27D4DED87150AADDBB2556
                                                    SHA1:74CF094D22A5806FD0DF01701851309CA3D3F263
                                                    SHA-256:A047FE59A6C64A6C17B887934245E64DAB2CDA4925B259456596C2C597740D75
                                                    SHA-512:3E1C65AD1FB8728724FEFCB8601918BEABCFBF4DC31AE17BC5BAD66BFA32DB184950AC077B0B27AE399A4B3A6B5890AAB325805F4444CDF07C4D216B7FDA4EDD
                                                    Malicious:false
                                                    Preview:BSCAL............................................l........"#........;.......iY........h..b....gz...........S....r...'.............p........=...^.............D...N........z...DSCAL..............................{.I..T.......\..?....;....X.+$g.=.7|5..G.N..X....v.eo.@.[...9.*>E.Y{..}[......w!j+..vy.8.p...w..&......I..B..s.W..\.G..f........../..../........Newborn.Craft Edge.Baby..........:.....:@...`...............................DSCAL..............................}.r..@.1.R...1H...Ul.A.k......~...l.[.J:E.X.".d(6J.*.....r..P....X.....I.j,.72Gcd$......>Xd.y,.[.e..zP`..$I......g5x..MhG.........................Bottle.Craft Edge.Baby..........:.....:. ..`.g.......Bottle.d.d.S....PNG........IHDR...d...d.....p.T....bKGD..............IDATx...Kh.k...'1*..I.1......QIM.X.."n,...*...U(RQhA..........Ru./XKI..N5.....g!...j&.s.~.N2....\.!.""..G....d2x....`.m.a..*..=@%..;.......btt....8~...*C.u..Mjmm....o?......&.u...*.. .iR4.......d(.......|.z..%. ....(.J..^.ze.X.p
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):92038
                                                    Entropy (8bit):7.7200406826946235
                                                    Encrypted:false
                                                    SSDEEP:1536:ca4Jw4jmV7T35O0vMSndbJMZSMSU514ph64P8beNFbWmGINBU0Od:ca2bmh35rkmrU5f4P8beNhhG0rM
                                                    MD5:E98226F38153CFBF93BF77744E364434
                                                    SHA1:6E613678B12144ADAA5ADCC18AA40965EB903101
                                                    SHA-256:825F3BA18ABDFA2164FBC1D183D8C1C178C9D99C3C4B694AC358D833A755D241
                                                    SHA-512:228B1334D11F455EC6610DB53E36BCC2D747975EB5E8D650D41C92FD856A34E266ACE5A8A094FCE407E518EF76B6E0B00C983A0CDCE2B930B2222E16A4B6A5CD
                                                    Malicious:false
                                                    Preview:BSCAL...................................................../+.......'G..\.....]..9.....s..~....:...^.........!.......X%.......7....4....!........?...qX......DSCAL..............................jy.l.j.;.\o..`P..a...c._.u.`....Gm2)T....^........$y..V............2....b&..?o....u.9...*.Zj.VT.J....h.C....!..B..jE..GP+.ewI.........0....0........Spring.Craft Edge.Shapes..........:.....:`c..`...............................DSCAL................................Q].........y....n%.3.Q.ky......{.`.P-P%.p..-TjNI..{-92...Y./.....N...!D...g....r.84X...M.....2h...b.^l.0P......}c...(...............7....7........3 Leaf Clover.Craft Edge.Shapes..........:.....:!T..`.f.......3 Leaf Clover.d.d.K....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..yX....?......3 ..z..j.".Rn.1-}.....Y.Y..R..-TvR,.5....4M%....f....I.......f.af...|}K...a.>.....}...|.^..I.A.h.o.6..-...A...A..yc;..7n.`.-l......^..dA......&..P....?0l.0.....e..4.N=''.7?x.C....-C.C..(@r+..(....k...S.23m&....34
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):114158
                                                    Entropy (8bit):7.754245071397085
                                                    Encrypted:false
                                                    SSDEEP:3072:o4KTAq4ntdBWZ4H9fCXCzTP0UuBkZcvqqUnj7K:ITCtzg4dCkgUuM1ju
                                                    MD5:1092617765A52BADA8A812FEA901B137
                                                    SHA1:31DAA90CFE29AFA8E3FAAA10C049B45834833308
                                                    SHA-256:88FF0A560A3DA375C323FD0C3761328419A06BA58E373EFB09F8418BC7EFF393
                                                    SHA-512:37DA07F3DA44D298CED21FA3323B54CADC839F3C19ACE0FC000A614C0D8FAD833ABC06C6239C89D8FFAB465848FADB3E667D365DB8310286935705A118FBF901
                                                    Malicious:false
                                                    Preview:BSCAL.......................................G/....1..7....AD...#....h..N....c|.. !............H...f........y....'.................H........>....>....Y..y'...T.........................DSCAL...............................w.L....,.....9YU.".Ad<..c.0RQI.?..."...>....ve...W.q.....b..Uk.N.......*g@.,.w....T.f(..A.Z..1Qn.i.h<.#.=..o..+.....}..B..@a.27.........0....0........Summer.Craft Edge.Shapes..........:.....:...`...............................DSCAL................................U....T...T..E.Uv4.....`.;.....c.]k....@.."T........p/..p.....S.D.\.....6.A.U"....+.4.#..uZ...4..2.."..(jy...*&...;./...5q|.........4....4...V....Beach Ball.Craft Edge.Shapes..........:.....:C...`..$......Beach Ball.d.d.}$...PNG........IHDR...d...d.....p.T....bKGD............ .IDATx..wxTU.._3.>.^ ....!!A@....Q.....k..._..u......AD.....K..&......!J.Rf2.....c..;)...~.y...{.=...9...........(...x.....;GJJ...'##...b.......O.>..............=d. .o...........v......L..=8m.6.^..#S.p.;@...~C.0`.
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):132558
                                                    Entropy (8bit):7.669771822889911
                                                    Encrypted:false
                                                    SSDEEP:3072:aqP0FOHIgQ/1E8d9ko/te/O+MFgriBmVdQIKgaKKHEZkiIZR1WjA/sBf:3P+Oogc1EyO8t4LMFgri0/3EPnIsEf
                                                    MD5:E6497DA72921573C22D29C664B5C1EAA
                                                    SHA1:5D2F7BBC3E94BDCA08B9DABBE47CB4762024FCB8
                                                    SHA-256:17BB9F3422F532DDFE5D6C9602E9E49BE765E4848ACA1C191CF0484B0092AB59
                                                    SHA-512:1090C1B1D4005725DF62A20D8D4D68E0B561E7A285104CBD99F42E16A170A1BA8A2452F05162212D05683264104DEE3F504C90CE38033A393E92B62427397562
                                                    Malicious:false
                                                    Preview:BSCAL.......................................f....h........3...a.....2.......}F..f.....T........f..X....)t....................*.......S........L....8...Y!........'....8..h$....]........r.......u...#........_........x....o........Q...V........'...DSCAL.................................6.I6{..tr....W....zY..2y..?>..4.....'...o.h.]..:....)f..c>t.<.....]..M..H..R...\..S?P..[....u.~..+ ..B.HR.....N....@..U.i..........0....0........Swirls.Craft Edge.Shapes..........:.....:.6..`...............................DSCAL..............................ix.0.X]..Sv..5....k.#.m|i.7..9.@q...:..``.=...p...0..8....n.q...@..cTgu...q_&...ib.q..O~\...S..........[a/S.E."...B\.....N............7....7...r....Flourish Sm 1.Craft Edge.Shapes..........:.....:....`.Q.......Flourish Sm 1.d.d.6....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..MHT]....C..VcX.Z...A.$..."k....A.B...}P.F...X$4ML..I..h..?.0....%3S.?...y..s.:....}.....s...?.8..9.suDD..0,....5.......W...#.(.B..p8(**.....{..
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):59279
                                                    Entropy (8bit):7.723890349807642
                                                    Encrypted:false
                                                    SSDEEP:1536:WQSDmzHAmdxSMSfXUkfK9H3BpBZYtzWBiAmNHDm:W35mdxS2kfOHR1sqB8g
                                                    MD5:A667A4635760A604F5E90455657DF9BA
                                                    SHA1:3ACEABEEDCFF9C6F7922FC954218D42D08B54A1F
                                                    SHA-256:196FD731971B11B3873D52EE13C1EFAC4BF9F0F91D82856CBBE05CA1FB659152
                                                    SHA-512:3ABCFEC0BC6D820F4317A32B3E027B1CC3D4438825844618AEEF1443C8A0F9A059C1FAF36ACE16F6CD156260D74BC92BDC9EA489BE8F23B1FEA069D795E0B1E3
                                                    Malicious:false
                                                    Preview:BSCAL..............$.0.$.0p......../.......................!..Z0....Q..g....Ad.......#n..6....Y.............................Z....f...)...DSCAL........p.................@......X33....^m...n-.C0O.i.!w.2G.,.".).22E....@2....B...W.8..x=Ic..L......".l.X.......2..0G...AO..s..?q.N......v(.8............-......8.|P?.?K.9smIe...,[+..6.E... ..`.........1....1........Symbols.Craft Edge.Shapes.....................`...............................DSCAL........p.................@......a33....^m...n-.C0O.i.!w.2G.,.".).223bk.].^...>2..{...I..,.v)&.....{. `......Q...4..J.b*..z<...t.....8).._..Y..r..*..'?...?.......gK.......1...!.X..W.T".g`U,.........../..../........Don't.Craft Edge.Shapes..................D..`.........Don't.d.d......PNG........IHDR...d...d.............bKGD.............RIDATx..]ilT..?....,m.m.Ri.J ..!..D.....(h.b.`..)1,..Ee..=..'....P..H.E-(..B...]..3].....fZ..3..7K...a2...w.}.w......A.h........^%.......d9.$.......J...Z[......:}.......f.hH.!./..H.!...Z""......"*)..r*
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:DIY-Thermocam raw data (Lepton 3.x), scale -20926-24706, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 500970464867410926013250174713856.000000
                                                    Category:dropped
                                                    Size (bytes):56822
                                                    Entropy (8bit):7.651463699422176
                                                    Encrypted:false
                                                    SSDEEP:768:1ro+zsC5ugrZR+LeBc+m5IShs7ohcTvNg2xhMNdZ/aDIg2fbGw:pugrb+LeGvNukcTlg20V/anS1
                                                    MD5:1FF0C9489E836499DB1ED7B3417BA478
                                                    SHA1:750206AB4FBD34B17205ADF33710F91140323915
                                                    SHA-256:74A96CB715FB81EB958BE3DFB60AF0C716D6CB0EF7DD1F5217CD15594DC3F39E
                                                    SHA-512:7EDE209919E3ECF80C47EBEC43207195AAC41C71F4C8398115AF2807EF07043A984086251C0A683A3F5F60AF51304D3559F9CC5385CE782FF5F6FA28B34F40B2
                                                    Malicious:false
                                                    Preview:BSCAL..............................D........................................."..+.....(........2..h....!?........N........Z..~....Vh..).....s.......L~..I.............a.........................DSCAL..........................@...yq..33....^m...n-.C0O.i.!w.2G.,.".).22..J.......F.b.So.X.D..U0.....{...~..T7..... ..t...$......$j.9"..n..g....I....*O,y.*..]..S..S,._.d......=>}.....w.k.O#...........F....F........Tags, Signs & Banners.Craft Edge.Miscellaneous.....................`...............................DSCAL...........?..............@...a..n33....^m...n-.C0O.i.!w.2G.,.".).22..\...N.Q.T..RtO.7c.R..e.Wu..i.%..h=...].L..i.M...g.....x.*b..O.2...A...eK......a=}...M...f.S..rZ.z'.cL._...;.Z....FK?gbP..x..........6....6........Tag 1.Craft Edge.Miscellaneous................."...`.........Tag 1.d.d......PNG........IHDR...d...d.............bKGD..............IDATx...MH*k...F....>.$(.h.JD.M..mZE......h!.H.......EB.%.-...QD.@.h....3w....9..<......a..._CAC.............Y..F.,.....4]V
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64537
                                                    Entropy (8bit):7.783531894467484
                                                    Encrypted:false
                                                    SSDEEP:1536:mY9p0pAuZhUVKdEmHZt/YPBkBbnFeAHiix8qwQ1tTepK:m1EVmT/YpMT8qwQoK
                                                    MD5:B877B821FAA0514BE7D67132C026D97B
                                                    SHA1:B634758494358A2951799BDCDAA664271DFAD248
                                                    SHA-256:32BC4297D594164F7BE3753FE2328132B0562C81C5EA18AC97831AE10C707F1B
                                                    SHA-512:FD47CD1C73A83DAC589EE449D28BAC8E6AFE4D74BFBC077D670BF57A7BF141B7865BDE1F0C5179A7BC9569917ACD9967C6D173B7967442648E104F420C7A921F
                                                    Malicious:false
                                                    Preview:BSCAL............................................x.........%........;........U........].......Ni........t...........}....2............K....f...{.......y....Z.....................T...DSCAL..............................u.n.W.....|.o..K.....F'.Q^Sv..@r.9.'....B..8...g.iv`...6.<Pj....1.E...U!.........E...$..(.........wd...O.n......^.rN.m$..q.x...........=....=........Talk Bubbles.Craft Edge.Miscellaneous..........;.....;C%..`...............................DSCAL..............................1.q5..G.8&.Y.j.2c6x..Ow....L.....j...PMC..@qt...P...=.!.kE...........(...g......O.o.......o...#...i......mC..TYx|..Mf].2l...........>....>........Talk Bubble 1.Craft Edge.Miscellaneous..........;.....;C...`.,.......Talk Bubble 1.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx.._L.......W:..F..f.F. ........Vy...k.Y.....(W[.juQ7.lm-.Uk....jm].-.dk....D(.<.../_.....N>.u.9....y=.....""p.A...8.p!...0....\.cp!...0....\.cp!...0....\.cp!...9X....~..AD"...$++.999...H
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):211380
                                                    Entropy (8bit):7.37236649718158
                                                    Encrypted:false
                                                    SSDEEP:3072:IOT3BfdrN6I+0ZQ/yYLtpAYVZy72KKkhaQ3iBbuRb4yVgwNefQd2Flx4wL0wT:1RFrN6I+02yf2KkJBOb4yVlefQ2FnT
                                                    MD5:5D5EAAC4FAA75CB7478198FEC28895CC
                                                    SHA1:D7FC225DE85266FACABF314B166C957FF35EB122
                                                    SHA-256:032B715FDE24B59BE882D379968C681AF09F0B15E9F42A9C55B8A668D78A36C7
                                                    SHA-512:DA90291D9022BADA837498A501DAC94414EE2B9A59724C7ADC656EDEA6FC8EAA060981B29ACFB92BC4BBFD358CAA6F379EB6C1B89510F2062E53B96A23888656
                                                    Malicious:false
                                                    Preview:BSCAL.......................7...............L....e...T........s....,"......./+........8........?..8....JH.......ZP.......P\.......~f.......wo..K.....z...............h........D...h.............g...U*................:......................'...:....a...)........ ..... ........+..X.....5........<.......JF........N........X....... `........k..e....Fv........|................n...a............[...W.................................j........n.........a....W...........n..........................e........).....&..w.....1..0...DSCAL...........F.....................P.^.C...Cj.;.K..S...n..g>.7.....&....."o.6Zn...s.C...#.C.g.....F.l..!....k9..X..A...SA.....hM...3..B1j@.]+...Q..M.?.S...[ .........0....0........USA.Craft Edge.Geography..........;.....;....`...............................DSCAL..............................J.T.R=k.x..&.....B....#.Y#.M....zY.o-.8s.iq.1 .Sc..h...:.i+.0_.Gh.{..N/......k%...G&..M.?.1R..W2ij..s......jx9..z5d..=4...A.P.H.........4....4...[....Alabama.Craft Edg
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):96301
                                                    Entropy (8bit):7.809129886497833
                                                    Encrypted:false
                                                    SSDEEP:1536:dINDJFcDGljnsSvjgSyRFLcqIqE+yh319vpvKA9Z4CPOSLbnBKoIytnR2kJ7dm:iRcCBbv0SyRFByd3vFKCGSXBKTyLRdm
                                                    MD5:E82C623CE1F741A9F4FDE9DC43F23630
                                                    SHA1:C2E84F76BFC81C1789AE7BB6AEE197E186774697
                                                    SHA-256:05D668F5C491AA51C7DA93862D3E3C5843A27631BBD1C0EF8034B94080D6CE00
                                                    SHA-512:6B51E4BE629BA85CA583A703700FD2CBFD43734BB29433BA4453CA068B767AB05B1F4084C71B22D6BF11D0B5CA73B9F4FF61A32436BA1A62CA465F1005847109
                                                    Malicious:false
                                                    Preview:BSCAL.......................................1........K....A!........1........@........O.......H`..?.....o...........d....p...........|....k.... ........>....,........L.......Ig......DSCAL...............................x..SA.{..s.g......9g]5.jB.HY.CslP...?.g(.. S/..K9#.....w\S..$M|vX.zKw/.Fl.`.`.c_=..q.......|.^a...kEX<....=..H!..t.....+.W...........2....2........Weather.Craft Edge.Weather..........;.....;....`...............................DSCAL...............................$...s....o..IsD.).8.$.LD&.,.').....,..,.x........J......I[...P..\.q...K:.}Y....... v%........*..?.n.\........L.g..2c..........1....1...C....Bolt 2.Craft Edge.Weather..........;.....;.$..`.........Bolt 2.d.d......PNG........IHDR...d...d.....p.T....bKGD.............CIDATx..{PT...(.{..q`.].EY....-...F.........Tk........F.m2...P.....'"7Q...H...#..6....\....F.\v...U>3........<..s.s.N$.>.~R.p.RRRD[V..N0..:u2...p...Q..'.....1e.D|.m*.m{.^^^.,.o..0yyy.={...+1v.(.>..prr.e.}=.'|..1L...E.*..
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 670.488708
                                                    Category:dropped
                                                    Size (bytes):77426
                                                    Entropy (8bit):7.644517291394499
                                                    Encrypted:false
                                                    SSDEEP:1536:3tRKxIbZjmpsrGj6q+RZFHMqxU9pSKi2RWscqh8Pi7Bs:3tR9bZycVlxzKnv78Pi7a
                                                    MD5:39DC4CE3E509EE530E2EC97E03E227D6
                                                    SHA1:E60B00E89197208BE2D9CF8F3C6C8661FBDEAED1
                                                    SHA-256:5296290ACDD86B7DABEAFABC26D0EF6FDD1A8DD9EA2914F036B94D0AD115B973
                                                    SHA-512:39711AE42F87C3E3B0E17A8378EFE05C416BA4D1895FF6F6E718B384D5C7699C318FF36CF420DCD480094EABCD9F07672ECB1FE3F4A3E64E8EF6C6450A010BD8
                                                    Malicious:false
                                                    Preview:BSCAL.....................p..................!...`#..[.....1... ...yR.......Ya.......0{..........|....j.... ........ .......&....B...07..DSCAL.................................QqI.;.`.....h...'I.T.C.:...L.;..F..U......k=R.iW...O.!..YY.P.0..p..c.........P...z..BWn ..q..{V....m....q%.I....?...C...........7....7........Winter.Craft Edge.Miscellaneous..........;.....;....`...............................DSCAL..............................,..)K.9......Z..3..-.R(.>..dq.............|n=r]M?.O!v...2..4.A..$...<'j...U..N.Wlm0.d...m..Z.B<?.f..GD,I..8*..S.........\.@rt..........@....@.... ...Gingerbread Man.Craft Edge.Miscellaneous..........;.....;."..`.e.......Gingerbread Man.d.d.H....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..y|.....3{%....IHB.H.g#..?.". ..V..?....Z.R<....`+"".....!}!^(.@...!!..9..v.....H......dwk}...\3..~..g.EQ.~.g.z...b.Z................ **...T........K.=.#.)++.w....O.=.GD.?a..z.....Zl...V..&...3u..n..w$$$x..\G...k..<..Br..I..H......\
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):132979
                                                    Entropy (8bit):7.662743912764236
                                                    Encrypted:false
                                                    SSDEEP:3072:viQWV2mUue1Kkp5F8U4rpAzmYDbUabHidS42O9mR:vTWa91dFr4rpwnUTdF2O6
                                                    MD5:F88752DB58C53A82F2DCD5D11F8233AB
                                                    SHA1:6D41999B017AD74783339AD00E03811F48A60E97
                                                    SHA-256:8B5AD9F2E46D3331989887761AFB6C3C7786BCA8D846444BF2FF234FD4E0E2DD
                                                    SHA-512:86350CC5DB773D092BFBDCB5710E90391ECE9D243E16706CD17E62197683520478FD32C2D4036DF45AF9326F59BF263A7FF7E56C662BEC5AA3960F6328852A00
                                                    Malicious:false
                                                    Preview:BSCAL.......................-......4........S....:.................!)........6.._....C<..>.....D......./S........\........b..i.....z.......W........j........f...-.................I........v....c...9......................J........*$........0..r.....;..&.....G..B.....M........Z........^........b..x....%v...........o....U...W................./........U.................;......................p................. .................a.......DSCAL..........................@...5.2N33....^m...n-.C0O.i.!w.2G.,.".).22.............a{[X ..N.>...{.,.W..0...{.]F<{a<f~....+.=...sj....M.,.<..z.(~.V.2|i....{j.(..C.'..`..]......R...Ex2...H.N.............6....6........Basic Shapes.Craft Edge.Shapes................."...`...............................DSCAL..........................@...3..k33....^m...n-.C0O.i.!w.2G.,.".).22|..B..[k.3..Y.....B..q..}4..X<.96H.. v..N...Nr......@......ss#%.\.:.g.3..4..$.e..3...3.....bd..c.<:.....L.t..... ...y.Y...................F....Arch.Craft Edge.Shapes...........
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):132558
                                                    Entropy (8bit):7.669771822889911
                                                    Encrypted:false
                                                    SSDEEP:3072:aqP0FOHIgQ/1E8d9ko/te/O+MFgriBmVdQIKgaKKHEZkiIZR1WjA/sBf:3P+Oogc1EyO8t4LMFgri0/3EPnIsEf
                                                    MD5:E6497DA72921573C22D29C664B5C1EAA
                                                    SHA1:5D2F7BBC3E94BDCA08B9DABBE47CB4762024FCB8
                                                    SHA-256:17BB9F3422F532DDFE5D6C9602E9E49BE765E4848ACA1C191CF0484B0092AB59
                                                    SHA-512:1090C1B1D4005725DF62A20D8D4D68E0B561E7A285104CBD99F42E16A170A1BA8A2452F05162212D05683264104DEE3F504C90CE38033A393E92B62427397562
                                                    Malicious:false
                                                    Preview:BSCAL.......................................f....h........3...a.....2.......}F..f.....T........f..X....)t....................*.......S........L....8...Y!........'....8..h$....]........r.......u...#........_........x....o........Q...V........'...DSCAL.................................6.I6{..tr....W....zY..2y..?>..4.....'...o.h.]..:....)f..c>t.<.....]..M..H..R...\..S?P..[....u.~..+ ..B.HR.....N....@..U.i..........0....0........Swirls.Craft Edge.Shapes..........:.....:.6..`...............................DSCAL..............................ix.0.X]..Sv..5....k.#.m|i.7..9.@q...:..``.=...p...0..8....n.q...@..cTgu...q_&...ib.q..O~\...S..........[a/S.E."...B\.....N............7....7...r....Flourish Sm 1.Craft Edge.Shapes..........:.....:....`.Q.......Flourish Sm 1.d.d.6....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..MHT]....C..VcX.Z...A.$..."k....A.B...}P.F...X$4ML..I..h..?.0....%3S.?...y..s.:....}.....s...?.8..9.suDD..0,....5.......W...#.(.B..p8(**.....{..
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 670.488708
                                                    Category:dropped
                                                    Size (bytes):77426
                                                    Entropy (8bit):7.644517291394499
                                                    Encrypted:false
                                                    SSDEEP:1536:3tRKxIbZjmpsrGj6q+RZFHMqxU9pSKi2RWscqh8Pi7Bs:3tR9bZycVlxzKnv78Pi7a
                                                    MD5:39DC4CE3E509EE530E2EC97E03E227D6
                                                    SHA1:E60B00E89197208BE2D9CF8F3C6C8661FBDEAED1
                                                    SHA-256:5296290ACDD86B7DABEAFABC26D0EF6FDD1A8DD9EA2914F036B94D0AD115B973
                                                    SHA-512:39711AE42F87C3E3B0E17A8378EFE05C416BA4D1895FF6F6E718B384D5C7699C318FF36CF420DCD480094EABCD9F07672ECB1FE3F4A3E64E8EF6C6450A010BD8
                                                    Malicious:false
                                                    Preview:BSCAL.....................p..................!...`#..[.....1... ...yR.......Ya.......0{..........|....j.... ........ .......&....B...07..DSCAL.................................QqI.;.`.....h...'I.T.C.:...L.;..F..U......k=R.iW...O.!..YY.P.0..p..c.........P...z..BWn ..q..{V....m....q%.I....?...C...........7....7........Winter.Craft Edge.Miscellaneous..........;.....;....`...............................DSCAL..............................,..)K.9......Z..3..-.R(.>..dq.............|n=r]M?.O!v...2..4.A..$...<'j...U..N.Wlm0.d...m..Z.B<?.f..GD,I..8*..S.........\.@rt..........@....@.... ...Gingerbread Man.Craft Edge.Miscellaneous..........;.....;."..`.e.......Gingerbread Man.d.d.H....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..y|.....3{%....IHB.H.g#..?.". ..V..?....Z.R<....`+"".....!}!^(.@...!!..9..v.....H......dwk}...\3..~..g.EQ.~.g.z...b.Z................ **...T........K.=.#.)++.w....O.=.GD.?a..z.....Zl...V..&...3u..n..w$$$x..\G...k..<..Br..I..H......\
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:DIY-Thermocam raw data (Lepton 3.x), scale -20926-24706, spot sensor temperature 0.000000, unit celsius, color scheme 0, maximum point enabled, calibration: offset 0.000000, slope 500970464867410926013250174713856.000000
                                                    Category:dropped
                                                    Size (bytes):56822
                                                    Entropy (8bit):7.651463699422176
                                                    Encrypted:false
                                                    SSDEEP:768:1ro+zsC5ugrZR+LeBc+m5IShs7ohcTvNg2xhMNdZ/aDIg2fbGw:pugrb+LeGvNukcTlg20V/anS1
                                                    MD5:1FF0C9489E836499DB1ED7B3417BA478
                                                    SHA1:750206AB4FBD34B17205ADF33710F91140323915
                                                    SHA-256:74A96CB715FB81EB958BE3DFB60AF0C716D6CB0EF7DD1F5217CD15594DC3F39E
                                                    SHA-512:7EDE209919E3ECF80C47EBEC43207195AAC41C71F4C8398115AF2807EF07043A984086251C0A683A3F5F60AF51304D3559F9CC5385CE782FF5F6FA28B34F40B2
                                                    Malicious:false
                                                    Preview:BSCAL..............................D........................................."..+.....(........2..h....!?........N........Z..~....Vh..).....s.......L~..I.............a.........................DSCAL..........................@...yq..33....^m...n-.C0O.i.!w.2G.,.".).22..J.......F.b.So.X.D..U0.....{...~..T7..... ..t...$......$j.9"..n..g....I....*O,y.*..]..S..S,._.d......=>}.....w.k.O#...........F....F........Tags, Signs & Banners.Craft Edge.Miscellaneous.....................`...............................DSCAL...........?..............@...a..n33....^m...n-.C0O.i.!w.2G.,.".).22..\...N.Q.T..RtO.7c.R..e.Wu..i.%..h=...].L..i.M...g.....x.*b..O.2...A...eK......a=}...M...f.S..rZ.z'.cL._...;.Z....FK?gbP..x..........6....6........Tag 1.Craft Edge.Miscellaneous................."...`.........Tag 1.d.d......PNG........IHDR...d...d.............bKGD..............IDATx...MH*k...F....>.$(.h.JD.M..mZE......h!.H.......EB.%.-...QD.@.h....3w....9..<......a..._CAC.............Y..F.,.....4]V
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):543833
                                                    Entropy (8bit):7.50496335178111
                                                    Encrypted:false
                                                    SSDEEP:6144:9DQ1236dLlSmlgZOw9/+wdM0zOyJromlIK1Z7HsH1GpYMnhdjYnDf67:dx6dLk/xSc+6sV8YIhdkDf67
                                                    MD5:7D692438B7E70DE932BC386A3D44D319
                                                    SHA1:5FC91DF8EA79A005A8583DCF44E0D48B7EC5A90F
                                                    SHA-256:05CB2D622DDEED62E052B8BBDB19DBE99B83F44F4447408601823B518D330586
                                                    SHA-512:1A605B25724B91BE5802104BC8BAA0C4EB0A3638CFD84D8AECFF10FC41B72BFD44DDD8DA34373C1BB8B7C8D4823D222441E0CFAF9696B8F119F8BEA37ED9724D
                                                    Malicious:false
                                                    Preview:BSCAL.......................4......D....6........'...j0....H..b........x....k........T...G%....9..}0....j...........]....r...N..................2...x...#............./...:9...iJ...F............k........d...z................-.................d...."............S....%...........................)..=.....7........B..@.....]........o..E....;....A...+...09...[....2..../..y....];........J.......WX........e........r......._...2........L........'.......=k....<..o^........Q.......<........A........r..DSCAL........@a"-..............@......v33....^m...n-.C0O.i.!w.2G.,.".).22.....N%....;.b7.P....G...1.u...iD..........A...[ys.@..zX.m.j.Y~....y...K<....n.l.......L...P..=......@...@.A4...t.@"..*z..........F....F........Createinspain Designs.Craft Edge.Miscellaneous..........4.....4....`...............................DSCAL..........................@.....r33....^m...n-.C0O.i.!w.2G.,.".).22.,"...~u..@....7.p.m.Q.&?@..d.>........ <"..-.`2@...aM.....+,..<........Sm.9....C.O.5p.Q..c....*
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):211380
                                                    Entropy (8bit):7.37236649718158
                                                    Encrypted:false
                                                    SSDEEP:3072:IOT3BfdrN6I+0ZQ/yYLtpAYVZy72KKkhaQ3iBbuRb4yVgwNefQd2Flx4wL0wT:1RFrN6I+02yf2KkJBOb4yVlefQ2FnT
                                                    MD5:5D5EAAC4FAA75CB7478198FEC28895CC
                                                    SHA1:D7FC225DE85266FACABF314B166C957FF35EB122
                                                    SHA-256:032B715FDE24B59BE882D379968C681AF09F0B15E9F42A9C55B8A668D78A36C7
                                                    SHA-512:DA90291D9022BADA837498A501DAC94414EE2B9A59724C7ADC656EDEA6FC8EAA060981B29ACFB92BC4BBFD358CAA6F379EB6C1B89510F2062E53B96A23888656
                                                    Malicious:false
                                                    Preview:BSCAL.......................7...............L....e...T........s....,"......./+........8........?..8....JH.......ZP.......P\.......~f.......wo..K.....z...............h........D...h.............g...U*................:......................'...:....a...)........ ..... ........+..X.....5........<.......JF........N........X....... `........k..e....Fv........|................n...a............[...W.................................j........n.........a....W...........n..........................e........).....&..w.....1..0...DSCAL...........F.....................P.^.C...Cj.;.K..S...n..g>.7.....&....."o.6Zn...s.C...#.C.g.....F.l..!....k9..X..A...SA.....hM...3..B1j@.]+...Q..M.?.S...[ .........0....0........USA.Craft Edge.Geography..........;.....;....`...............................DSCAL..............................J.T.R=k.x..&.....B....#.Y#.M....zY.o-.8s.iq.1 .Sc..h...:.i+.0_.Gh.{..N/......k%...G&..M.?.1R..W2ij..s......jx9..z5d..=4...A.P.H.........4....4...[....Alabama.Craft Edg
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):96301
                                                    Entropy (8bit):7.809129886497833
                                                    Encrypted:false
                                                    SSDEEP:1536:dINDJFcDGljnsSvjgSyRFLcqIqE+yh319vpvKA9Z4CPOSLbnBKoIytnR2kJ7dm:iRcCBbv0SyRFByd3vFKCGSXBKTyLRdm
                                                    MD5:E82C623CE1F741A9F4FDE9DC43F23630
                                                    SHA1:C2E84F76BFC81C1789AE7BB6AEE197E186774697
                                                    SHA-256:05D668F5C491AA51C7DA93862D3E3C5843A27631BBD1C0EF8034B94080D6CE00
                                                    SHA-512:6B51E4BE629BA85CA583A703700FD2CBFD43734BB29433BA4453CA068B767AB05B1F4084C71B22D6BF11D0B5CA73B9F4FF61A32436BA1A62CA465F1005847109
                                                    Malicious:false
                                                    Preview:BSCAL.......................................1........K....A!........1........@........O.......H`..?.....o...........d....p...........|....k.... ........>....,........L.......Ig......DSCAL...............................x..SA.{..s.g......9g]5.jB.HY.CslP...?.g(.. S/..K9#.....w\S..$M|vX.zKw/.Fl.`.`.c_=..q.......|.^a...kEX<....=..H!..t.....+.W...........2....2........Weather.Craft Edge.Weather..........;.....;....`...............................DSCAL...............................$...s....o..IsD.).8.$.LD&.,.').....,..,.x........J......I[...P..\.q...K:.}Y....... v%........*..?.n.\........L.g..2c..........1....1...C....Bolt 2.Craft Edge.Weather..........;.....;.$..`.........Bolt 2.d.d......PNG........IHDR...d...d.....p.T....bKGD.............CIDATx..{PT...(.{..q`.].EY....-...F.........Tk........F.m2...P.....'"7Q...H...#..6....\....F.\v...U>3........<..s.s.N$.>.~R.p.RRRD[V..N0..:u2...p...Q..'.....1e.D|.m*.m{.^^^.,.o..0yyy.={...+1v.(.>..prr.e.}=.'|..1L...E.*..
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):66594
                                                    Entropy (8bit):7.800838697373916
                                                    Encrypted:false
                                                    SSDEEP:1536:bOqndgG+IQ32TpUJz0DXmKTmg9usUFSZVl:bvQ3216zuXlFZVl
                                                    MD5:DE2D8D73F85285535A13F89B0F904847
                                                    SHA1:A4A42EB9FA7F9C8A51CD24560D999163DEE57290
                                                    SHA-256:306F7E5AFA1685939708DBBDAC6A0DD91DFE7C106BA6F84780BE9E44656B775B
                                                    SHA-512:CD1E87D933E8E821769721A1B03E244655D519722329E114388FD5E18F4DA57DAA7D2E769379C4938BA8F958AA71A87FD1DA194967A57EF5B94AA3347ECB8D29
                                                    Malicious:false
                                                    Preview:BSCAL.....................y...............................>!..M.....-..&.....I..).....Z........y..H......................}.........................DSCAL..............................4..a.A...;..l..0=a..S^[{.. ....D.2R..[N.HFm.qA%.D1E..<..~....i...e....R....O...`@...{P.....PAn|...J.......'I.4|0.....]H..I!D..........................Game.Craft Edge.Shapes..........9.....9....`...............................DSCAL....................................V.%....w$..g.....n..p.~......5W...Wi;..O.-.T..6T.,...(*..........*.......l<|....<...A.F_......`..).v.;....:.Q.........................Club.Craft Edge.Shapes..........9.....9.7..`.........Club.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{....?.......rY..0.PX..X.07...\.r..Fc.. .0.$>....ZIU....h..(r....-., ..B..X.X.1;....ced....L...g.t......9.....;..y..(..|7..466r..a..9..'.4..02....X,.......`.aD".<..g.. ..g...x..j.ne....E$.A.$<...<...q\$ID.....$Ix..e.$.I..(..g.iL.<........|.....q...x..
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):59279
                                                    Entropy (8bit):7.723890349807642
                                                    Encrypted:false
                                                    SSDEEP:1536:WQSDmzHAmdxSMSfXUkfK9H3BpBZYtzWBiAmNHDm:W35mdxS2kfOHR1sqB8g
                                                    MD5:A667A4635760A604F5E90455657DF9BA
                                                    SHA1:3ACEABEEDCFF9C6F7922FC954218D42D08B54A1F
                                                    SHA-256:196FD731971B11B3873D52EE13C1EFAC4BF9F0F91D82856CBBE05CA1FB659152
                                                    SHA-512:3ABCFEC0BC6D820F4317A32B3E027B1CC3D4438825844618AEEF1443C8A0F9A059C1FAF36ACE16F6CD156260D74BC92BDC9EA489BE8F23B1FEA069D795E0B1E3
                                                    Malicious:false
                                                    Preview:BSCAL..............$.0.$.0p......../.......................!..Z0....Q..g....Ad.......#n..6....Y.............................Z....f...)...DSCAL........p.................@......X33....^m...n-.C0O.i.!w.2G.,.".).22E....@2....B...W.8..x=Ic..L......".l.X.......2..0G...AO..s..?q.N......v(.8............-......8.|P?.?K.9smIe...,[+..6.E... ..`.........1....1........Symbols.Craft Edge.Shapes.....................`...............................DSCAL........p.................@......a33....^m...n-.C0O.i.!w.2G.,.".).223bk.].^...>2..{...I..,.v)&.....{. `......Q...4..J.b*..z<...t.....8).._..Y..r..*..'?...?.......gK.......1...!.X..W.T".g`U,.........../..../........Don't.Craft Edge.Shapes..................D..`.........Don't.d.d......PNG........IHDR...d...d.............bKGD.............RIDATx..]ilT..?....,m.m.Ri.J ..!..D.....(h.b.`..)1,..Ee..=..'....P..H.E-(..B...]..3].....fZ..3..7K...a2...w.}.w......A.h........^%.......d9.$.......J...Z[......:}.......f.hH.!./..H.!...Z""......"*)..r*
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):44241
                                                    Entropy (8bit):7.747233988337866
                                                    Encrypted:false
                                                    SSDEEP:768:tZh3JPKW648iSo736Az5jwwcFuyZ3Y1Lnhe5xaLZPTAXogkA1sywv6:thPKz4/7h6fZ3Y1LhqxaB0Xrkosfv6
                                                    MD5:561A63F0CD4A70F3134143A5E266E58D
                                                    SHA1:18F871AE3532B1F9A030EBF2EEE7AA7A4491D60C
                                                    SHA-256:7C1B0B11EBF37D03AE2F6CF5135593D604BC1D3BF942329A3952DC0CCB770769
                                                    SHA-512:52F15AE1794120CA3E7E6204A4AEC9364BB8EBF7BF446753C53E8B5232BD7F76114603DABF41562318903EBEBB5390CDC4E651CDB33350AC5F3C0BDEDBBE3594
                                                    Malicious:false
                                                    Preview:BSCAL.....................g........,.............Q........0........(,.......19........B..C.....W........_........t..Y$...'.......DSCAL..........................@...Ps..33....^m...n-.C0O.i.!w.2G.,.".).22.4....Q....<.^..]e..!..G`......E..B..,..O..ev.b.....j P[Oc. ?1o65.O..r.dp.X.....7..O*B...p.Q..pU....e<...4X.H...uU4J*?.........................Music.Craft Edge.Music.................0'..`...............................DSCAL........`.................@....:.<33....^m...n-.C0O.i.!w.2G.,.".).22.P...A....^.M._.Z.vpMD<.Z.i+..\:.v......."...o...E.5..W.......M).....@.....K....~.t(.y...T.S......6~..hx..~w.=..d.3'.............4....4........Double Note.Craft Edge.Music................. ...`.........Double Note.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx..ML....}..v.n.Xy..iS..h<j8.1x.111.x0^L..M.zQ.&..$....1..'.....H./@)..R.ei;...o.R...:...v..<;...4.Q.B...-u....p..`..`..@....p.\+.cB..,................ ...099.o...8.<.B...(^.x.....e1!.J.099.@ .@ .`0
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):92038
                                                    Entropy (8bit):7.7200406826946235
                                                    Encrypted:false
                                                    SSDEEP:1536:ca4Jw4jmV7T35O0vMSndbJMZSMSU514ph64P8beNFbWmGINBU0Od:ca2bmh35rkmrU5f4P8beNhhG0rM
                                                    MD5:E98226F38153CFBF93BF77744E364434
                                                    SHA1:6E613678B12144ADAA5ADCC18AA40965EB903101
                                                    SHA-256:825F3BA18ABDFA2164FBC1D183D8C1C178C9D99C3C4B694AC358D833A755D241
                                                    SHA-512:228B1334D11F455EC6610DB53E36BCC2D747975EB5E8D650D41C92FD856A34E266ACE5A8A094FCE407E518EF76B6E0B00C983A0CDCE2B930B2222E16A4B6A5CD
                                                    Malicious:false
                                                    Preview:BSCAL...................................................../+.......'G..\.....]..9.....s..~....:...^.........!.......X%.......7....4....!........?...qX......DSCAL..............................jy.l.j.;.\o..`P..a...c._.u.`....Gm2)T....^........$y..V............2....b&..?o....u.9...*.Zj.VT.J....h.C....!..B..jE..GP+.ewI.........0....0........Spring.Craft Edge.Shapes..........:.....:`c..`...............................DSCAL................................Q].........y....n%.3.Q.ky......{.`.P-P%.p..-TjNI..{-92...Y./.....N...!D...g....r.84X...M.....2h...b.^l.0P......}c...(...............7....7........3 Leaf Clover.Craft Edge.Shapes..........:.....:!T..`.f.......3 Leaf Clover.d.d.K....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..yX....?......3 ..z..j.".Rn.1-}.....Y.Y..R..-TvR,.5....4M%....f....I.......f.af...|}K...a.>.....}...|.^..I.A.h.o.6..-...A...A..yc;..7n.`.-l......^..dA......&..P....?0l.0.....e..4.N=''.7?x.C....-C.C..(@r+..(....k...S.23m&....34
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):81816
                                                    Entropy (8bit):7.707519991934002
                                                    Encrypted:false
                                                    SSDEEP:1536:bsicsYedzR8eO9gKbvL2aiWqAIqwsoxlprW+DWu8UYHI7zoZ8jPy74RSBsZ:7p/dG9Bbz2DWqA1w7jKGWY3oujfRSBsZ
                                                    MD5:4C1F9B5ECF86DC7B839BF5D8F3ADFDC0
                                                    SHA1:CC6D1748BD0FFBB9036C0D871EC894E59B1CD6FC
                                                    SHA-256:F2A2A3C04FB8E6E9467A62B408F705D77C9A4269B2ADF5EC1947A871A0D1C4F9
                                                    SHA-512:C49470EBA77A8616E7CE32CFE8DA98010635BDA0046BD8904328D11777162DE9774635F20627A772F24719DA3C7E217CDEB8A8ED41BBD71B04C722D6F0E217AB
                                                    Malicious:false
                                                    Preview:BSCAL.....................y.................#..............%..F.....D...(....m................X...x........q....A...`..................%...H...P$..DSCAL.................................`..xG{0.G.N.X..)_...j.QW...K. t.{.L..!'.%=.....I..bE..|&..N2..!..s..c..x6..../D..c.=FEY....J..7.V.Q...>j..:.B......5....p.........................Fall.Craft Edge.Shapes..........9.....9!...`...............................DSCAL.................................l.........H.ES..5.....P.Qo{.=...T...*-.\X.h.5|S9.<...frt..N.k.n.-.2...-.,...M......!.B{.`n...~O.d..l.5......f.V..4BZ. ............/..../...7....Acorn.Craft Edge.Shapes..........9.....9....`.v.......Acorn.d.d.c....PNG........IHDR...d...d.....p.T....bKGD..............IDATx..{|S...I.$M....By....E(.D...Zqt....yl...{.P.|.6...G......+.V@..@'..h...B.i.4..q...!V..7.....49.{.o...{.2A........@._G...H..'.i.............].kF....W......@.dP...=QT..<8y.o.."..&.^Haa!3.N"g......w{..mJJ.."%%%h..V....g.sS...d.D...t..j.S1..k!UUU...'..7?.F
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64537
                                                    Entropy (8bit):7.783531894467484
                                                    Encrypted:false
                                                    SSDEEP:1536:mY9p0pAuZhUVKdEmHZt/YPBkBbnFeAHiix8qwQ1tTepK:m1EVmT/YpMT8qwQoK
                                                    MD5:B877B821FAA0514BE7D67132C026D97B
                                                    SHA1:B634758494358A2951799BDCDAA664271DFAD248
                                                    SHA-256:32BC4297D594164F7BE3753FE2328132B0562C81C5EA18AC97831AE10C707F1B
                                                    SHA-512:FD47CD1C73A83DAC589EE449D28BAC8E6AFE4D74BFBC077D670BF57A7BF141B7865BDE1F0C5179A7BC9569917ACD9967C6D173B7967442648E104F420C7A921F
                                                    Malicious:false
                                                    Preview:BSCAL............................................x.........%........;........U........].......Ni........t...........}....2............K....f...{.......y....Z.....................T...DSCAL..............................u.n.W.....|.o..K.....F'.Q^Sv..@r.9.'....B..8...g.iv`...6.<Pj....1.E...U!.........E...$..(.........wd...O.n......^.rN.m$..q.x...........=....=........Talk Bubbles.Craft Edge.Miscellaneous..........;.....;C%..`...............................DSCAL..............................1.q5..G.8&.Y.j.2c6x..Ow....L.....j...PMC..@qt...P...=.!.kE...........(...g......O.o.......o...#...i......mC..TYx|..Mf].2l...........>....>........Talk Bubble 1.Craft Edge.Miscellaneous..........;.....;C...`.,.......Talk Bubble 1.d.d......PNG........IHDR...d...d.....p.T....bKGD..............IDATx.._L.......W:..F..f.F. ........Vy...k.Y.....(W[.juQ7.lm-.Uk....jm].-.dk....D(.<.../_.....N>.u.9....y=.....""p.A...8.p!...0....\.cp!...0....\.cp!...0....\.cp!...9X....~..AD"...$++.999...H
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):76044
                                                    Entropy (8bit):7.781593198930996
                                                    Encrypted:false
                                                    SSDEEP:1536:9zCUsvuDmEm7KAaAJB2x56SPCwlkmsKpUaYVRMguAIXSA2:9z/s2Vm7KAajfl/sKpUaYVRM8YSf
                                                    MD5:FA20A58E0C27D4DED87150AADDBB2556
                                                    SHA1:74CF094D22A5806FD0DF01701851309CA3D3F263
                                                    SHA-256:A047FE59A6C64A6C17B887934245E64DAB2CDA4925B259456596C2C597740D75
                                                    SHA-512:3E1C65AD1FB8728724FEFCB8601918BEABCFBF4DC31AE17BC5BAD66BFA32DB184950AC077B0B27AE399A4B3A6B5890AAB325805F4444CDF07C4D216B7FDA4EDD
                                                    Malicious:false
                                                    Preview:BSCAL............................................l........"#........;.......iY........h..b....gz...........S....r...'.............p........=...^.............D...N........z...DSCAL..............................{.I..T.......\..?....;....X.+$g.=.7|5..G.N..X....v.eo.@.[...9.*>E.Y{..}[......w!j+..vy.8.p...w..&......I..B..s.W..\.G..f........../..../........Newborn.Craft Edge.Baby..........:.....:@...`...............................DSCAL..............................}.r..@.1.R...1H...Ul.A.k......~...l.[.J:E.X.".d(6J.*.....r..P....X.....I.j,.72Gcd$......>Xd.y,.[.e..zP`..$I......g5x..MhG.........................Bottle.Craft Edge.Baby..........:.....:. ..`.g.......Bottle.d.d.S....PNG........IHDR...d...d.....p.T....bKGD..............IDATx...Kh.k...'1*..I.1......QIM.X.."n,...*...U(RQhA..........Ru./XKI..N5.....g!...j&.s.~.N2....\.!.""..G....d2x....`.m.a..*..=@%..;.......btt....8~...*C.u..Mjmm....o?......&.u...*.. .iR4.......d(.......|.z..%. ....(.J..^.ze.X.p
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):114158
                                                    Entropy (8bit):7.754245071397085
                                                    Encrypted:false
                                                    SSDEEP:3072:o4KTAq4ntdBWZ4H9fCXCzTP0UuBkZcvqqUnj7K:ITCtzg4dCkgUuM1ju
                                                    MD5:1092617765A52BADA8A812FEA901B137
                                                    SHA1:31DAA90CFE29AFA8E3FAAA10C049B45834833308
                                                    SHA-256:88FF0A560A3DA375C323FD0C3761328419A06BA58E373EFB09F8418BC7EFF393
                                                    SHA-512:37DA07F3DA44D298CED21FA3323B54CADC839F3C19ACE0FC000A614C0D8FAD833ABC06C6239C89D8FFAB465848FADB3E667D365DB8310286935705A118FBF901
                                                    Malicious:false
                                                    Preview:BSCAL.......................................G/....1..7....AD...#....h..N....c|.. !............H...f........y....'.................H........>....>....Y..y'...T.........................DSCAL...............................w.L....,.....9YU.".Ad<..c.0RQI.?..."...>....ve...W.q.....b..Uk.N.......*g@.,.w....T.f(..A.Z..1Qn.i.h<.#.=..o..+.....}..B..@a.27.........0....0........Summer.Craft Edge.Shapes..........:.....:...`...............................DSCAL................................U....T...T..E.Uv4.....`.;.....c.]k....@.."T........p/..p.....S.D.\.....6.A.U"....+.4.#..uZ...4..2.."..(jy...*&...;./...5q|.........4....4...V....Beach Ball.Craft Edge.Shapes..........:.....:C...`..$......Beach Ball.d.d.}$...PNG........IHDR...d...d.....p.T....bKGD............ .IDATx..wxTU.._3.>.^ ....!!A@....Q.....k..._..u......AD.....K..&......!J.Rf2.....c..;)...~.y...{.=...9...........(...x.....;GJJ...'##...b.......O.>..............=d. .o...........v......L..=8m.6.^..#S.p.;@...~C.0`.
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):56223
                                                    Entropy (8bit):7.675938408908281
                                                    Encrypted:false
                                                    SSDEEP:1536:/+jsHu4IMEuSznazX2TQZwm+WxhM6HMy6Z7:/ppIMEulGTuwmXhMwMB
                                                    MD5:619CA288DE840F0BEC52218DB7F2036C
                                                    SHA1:D1D5389AAE91284734F4940BD8319CFA2BC40A0D
                                                    SHA-256:C2A6D78B635CA45E316D10936EF7507B1643F4674BAA08B79FE22285EADC3966
                                                    SHA-512:4FACBC40E37F9801E9177A057D55BF236C5FBCE5397AF973B60B21C027AB258FD1A91B893F93AE3100A6785AD67089FBF623C121B7D4990A987A311E47314E5C
                                                    Malicious:false
                                                    Preview:BSCAL...............)...............................................$..G..............4........=.......~L..`.....U........n........y.......T............O....W...%....|...b............z................DSCAL...............................|.1..%.[.B=l.8....I9s\QP2..?..U.G....."....7..[d.b...6.,J]./;[.{T....*bV....$G.M......../T..5y............w.5.y...N...:.,.y..k.........0....0........Arrows.Craft Edge.Shapes..........8.....8"...`...............................DSCAL................................ u..d[........P.[..Y5eD..w..s.5~.._.Ev\.,o...E.......}5..3J..6.6E<W|.....6.[..s..... .@zc.X.f....I.........R.f..x.T.....A.........1....1..."....Arrow 1.Craft Edge.Shapes..........8.....8....`.........Arrow 1.d.d......PNG........IHDR...d...d.....p.T....bKGD.............AIDATx...KHT{....c.$......l..g(...DP..4.@#h.Zd.,.!Y..R8.P..&.EFa..I.E....K."....t..v.v.uG...2.....A_..9z,B.4....Po@|O.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(F.(&,...v.......C..Phii....7o.P[[..h......
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):595545
                                                    Entropy (8bit):7.0713050562667386
                                                    Encrypted:false
                                                    SSDEEP:12288:fTBZLFkAEYvIfNLmu2cTbZqSNTuh4kMjBUJ84Ch9ycd8sl:f7LgLF2cbZtNT+sjOJXCrgsl
                                                    MD5:3695D419AA9C7B11C464BE2A58A40530
                                                    SHA1:C73513DF0555DB421EF81EF436136E53CCF4EE11
                                                    SHA-256:0487C6C64C185AC5BF459A907F302E363E5A162081B651570E691B3EA07818DD
                                                    SHA-512:54883F5E76E2208856F07DC16C9E5BCEA3ACBDA7C4B9CE48BF043CC371AD57F2925DCB6360CA85F5725609FC692906546B6E5BF70D8F839A206E06316C9E2F59
                                                    Malicious:false
                                                    Preview:BSCAL.......................2......H....(...........w....r...&?........E...cI...2....|...D........!................."....#...)....M...2............c....-........"........X...JW...*.......4........+........n...BQ..."....s...5...U...5/........@...8....M....f...2.......d*...a........1....+...3...j'....D...,...Kq.../...(....!.......b....H...~.........-...u<.......{R..r.....j..@....-....B........*......../...."..\$....G........`..].....y...(.......5............k... "...........DSCAL..........................@......d33....^m...n-.C0O.i.!w.2G.,.".).22...S...V.P...~).......PJ...._..q..7.4..l...}.........^M.rY......".L..+...|.X.....)...i..B...+~i..s.82.X........x.9..(M..L.........J....J........MichelleMyBelle Creations.Craft Edge.Miscellaneous..........;.....;B...`...............................DSCAL..........................@...c..#33....^m...n-.C0O.i.!w.2G.,.".).22.F..`m`..XJh9u..pFdCp%.R..9z.n...Qe.. 3.{,"....,`.9.+.5.D........vr..72#..s.U.y"[.6...h.3M. 2O..x.f.Ah.`.L.9...
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1142272
                                                    Entropy (8bit):6.575328533778386
                                                    Encrypted:false
                                                    SSDEEP:24576:JjNy0cphFIlPXI9RTczazoP2l0iS65WQ1jGb8JcBCu98xvtQ/U:JY0MhO+louaizR1jGb8iBCu98xvtQ/U
                                                    MD5:21CF2233F94BF81E22737E2CAE984FD1
                                                    SHA1:428951E7391B7CFCA62624C11E24B361CAD9D2E0
                                                    SHA-256:FCB2DC122AD93E88AA07B99DB1292CF5B8F04F7F5125C7A9AD98E8790E0F7366
                                                    SHA-512:F033174BB79D1F0E9D23FBE983A5D5849AE7CC99BA52D7CB5480F55F25CDDAE0EADE184FBF7DF970DE39B6FA315A049A13234D8379C72DC5AE2E8DDBABA13772
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t6.&0W.u0W.u0W.u9/|u.W.u9/mu.W.u9/ju.W.u...u:W.u...u'W.u0W.u.V.u9/cu.W.u9/{u1W.u..}u1W.u9/xu1W.uRich0W.u........................PE..L......T...........!.........N...............0...............................P.......c....@..........................b.......B...........1......................./..pq..................................@............0...............................text... ........................... ..`.rdata...5...0...6... ..............@..@.data...\....p...l...V..............@....rsrc....1.......2..................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:modified
                                                    Size (bytes):3805184
                                                    Entropy (8bit):6.981118512863489
                                                    Encrypted:false
                                                    SSDEEP:49152:8vEFI1Qof0vYjuVdAHf73Or2+595THLZHePIoIrIk7jsIJq4qXMnF89:8vEFaQjAjuYHf7erx5TNepUJ
                                                    MD5:5F301B2942D42D35402C384009767E5F
                                                    SHA1:CF7A22C7C4A3C535B1B76D8B4FD5E17B3166FF44
                                                    SHA-256:7909A486FB464E8332395296B6D1930B0B2E2B008BBA1E68B696D315BC5B3323
                                                    SHA-512:9BF15BC5D25853AA66FDD88B1464CAC2D1D58AE556BBD53506FEBA88DF52A775835A4EC7D1AAA1A00414044C87C2299298D1D9DC5CEA91125574C63BD789307B
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 67%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:U.L.................."..h......@."......."...@..........................p:.......:.....................................$.".......#.X.............................................................................".L............................text.....".......".................`....rdata........".......".............@..@.data....c....#..0....".............@....rsrc.........#......(#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1305600
                                                    Entropy (8bit):6.804982979697153
                                                    Encrypted:false
                                                    SSDEEP:24576:emdh6XRecOlYMksUqYMSMvm+YNqwngZRa5R+joLzydTEfCSoIkNyi220BTpdAd:emdhnc3lgZRa7+jo6YR8eXBT3Ad
                                                    MD5:6330B1294C40518F7C6363F97338A0A9
                                                    SHA1:350E07281719E55659F74884387FA072C0D53F52
                                                    SHA-256:4D100667AD119AD52D1172173C97EB9EC30B7C378070DFD2D07A2A04767B4D86
                                                    SHA-512:97E1D71881663496011E5B3D70E817D62EB39CD484CB091A633D6329BFF2900029B04D0086358A522C3BFDA187FC7AEBEEDACC16003FCD2937DF047A89D4E54F
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~.3.:.].:.].:.].7.....].7.....].7....]..3..3.].:.\..].G....].G...;.].7...;.].G...;.].Rich:.].........................PE..L....g.`...........!.................o.......................................P............@.........................p3.../...c..d................................w..................................P...@............................................text...@........................... ..`.rdata..............................@..@.data....8...p.......Z..............@....tls....)............p..............@....rsrc................r..............@..@.reloc...w.......x...t..............@..B........................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):348160
                                                    Entropy (8bit):6.542655141037356
                                                    Encrypted:false
                                                    SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                    MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                    SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                    SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                    SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1305600
                                                    Entropy (8bit):6.804982979697153
                                                    Encrypted:false
                                                    SSDEEP:24576:emdh6XRecOlYMksUqYMSMvm+YNqwngZRa5R+joLzydTEfCSoIkNyi220BTpdAd:emdhnc3lgZRa7+jo6YR8eXBT3Ad
                                                    MD5:6330B1294C40518F7C6363F97338A0A9
                                                    SHA1:350E07281719E55659F74884387FA072C0D53F52
                                                    SHA-256:4D100667AD119AD52D1172173C97EB9EC30B7C378070DFD2D07A2A04767B4D86
                                                    SHA-512:97E1D71881663496011E5B3D70E817D62EB39CD484CB091A633D6329BFF2900029B04D0086358A522C3BFDA187FC7AEBEEDACC16003FCD2937DF047A89D4E54F
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~.3.:.].:.].:.].7.....].7.....].7....]..3..3.].:.\..].G....].G...;.].7...;.].G...;.].Rich:.].........................PE..L....g.`...........!.................o.......................................P............@.........................p3.../...c..d................................w..................................P...@............................................text...@........................... ..`.rdata..............................@..@.data....8...p.......Z..............@....tls....)............p..............@....rsrc................r..............@..@.reloc...w.......x...t..............@..B........................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1142272
                                                    Entropy (8bit):6.575328533778386
                                                    Encrypted:false
                                                    SSDEEP:24576:JjNy0cphFIlPXI9RTczazoP2l0iS65WQ1jGb8JcBCu98xvtQ/U:JY0MhO+louaizR1jGb8iBCu98xvtQ/U
                                                    MD5:21CF2233F94BF81E22737E2CAE984FD1
                                                    SHA1:428951E7391B7CFCA62624C11E24B361CAD9D2E0
                                                    SHA-256:FCB2DC122AD93E88AA07B99DB1292CF5B8F04F7F5125C7A9AD98E8790E0F7366
                                                    SHA-512:F033174BB79D1F0E9D23FBE983A5D5849AE7CC99BA52D7CB5480F55F25CDDAE0EADE184FBF7DF970DE39B6FA315A049A13234D8379C72DC5AE2E8DDBABA13772
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t6.&0W.u0W.u0W.u9/|u.W.u9/mu.W.u9/ju.W.u...u:W.u...u'W.u0W.u.V.u9/cu.W.u9/{u1W.u..}u1W.u9/xu1W.uRich0W.u........................PE..L......T...........!.........N...............0...............................P.......c....@..........................b.......B...........1......................./..pq..................................@............0...............................text... ........................... ..`.rdata...5...0...6... ..............@..@.data...\....p...l...V..............@....rsrc....1.......2..................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):499712
                                                    Entropy (8bit):6.414789978441117
                                                    Encrypted:false
                                                    SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                    MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                    SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                    SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                    SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):3805184
                                                    Entropy (8bit):6.981118354340119
                                                    Encrypted:false
                                                    SSDEEP:49152:XvEFI1Qof0vYjuVdAHf73Or2+595THLZHePIoIrIk7jsIJq4qXMnF89:XvEFaQjAjuYHf7erx5TNepUJ
                                                    MD5:1C53F12FF7CC73F093FF36F4B844A700
                                                    SHA1:F56DC7F25C13D00EC4E787CC4F511FB245251138
                                                    SHA-256:E4D0D42CFAF194CC10B5B75658E6F84F846BE4D97E0A48105BA89FC81A66B65E
                                                    SHA-512:7F9F01658E7ADEE1E8419FB9925CC33D9491A2CBA55FD6111C8BC0D37040BC38956C2A17EB9A1E554FF40B02D2FB4196ED24BF503DAB364318D8486815AC6985
                                                    Malicious:false
                                                    Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:U.L.................."..h......@."......."...@..........................p:.......:.....................................$.".......#.X.............................................................................".L............................text.....".......".................`....rdata........".......".............@..@.data....c....#..0....".............@....rsrc.........#......(#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):15864
                                                    Entropy (8bit):5.446150628226878
                                                    Encrypted:false
                                                    SSDEEP:384:zVQEjoZ7ooLzDCccymQx/9DSpNAJemtjf0Ncl08:zV1joxLH1SpKJtTF08
                                                    MD5:43F2BC6828B177477C2F98B8973460E8
                                                    SHA1:F0A3C975346AF66A843E8B49574DC9083CD32E02
                                                    SHA-256:3B578B15AD0D0747E8A3D958A0E7BF1FF6D5C335B8894FF7A020604DA008D79D
                                                    SHA-512:2449C3D615E5BCECE4C1B773FE629A75061A3E1488F6D3D743D7D209F1D687F26997937AB13B3A1B89B650D122DB030D2188E1E89BC1AB03CF2DF9A29CAA456C
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................l.......^...............Rich............PE..L.....C (.........!.........................0....@..........................`......B}...............................'.......$..P....@..H....................P..<.......T...............................................|............................text............................... ..`.data........0....... ..............@....rsrc...H....@......."..............@..@.reloc.......P.......&..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):499712
                                                    Entropy (8bit):6.414789978441117
                                                    Encrypted:false
                                                    SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                    MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                    SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                    SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                    SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):348160
                                                    Entropy (8bit):6.542655141037356
                                                    Encrypted:false
                                                    SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                    MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                    SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                    SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                    SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):2555217
                                                    Entropy (8bit):6.364161494552352
                                                    Encrypted:false
                                                    SSDEEP:49152:gdrGT9oY0SAQ4+YI1Qb1oWGxblxZa0o8598j:gFGTv1QtGxHZabt
                                                    MD5:0F299B44F450181D8B1B058637377507
                                                    SHA1:11CE62C7229B835C838167D8E0F2D9F41B54ADAE
                                                    SHA-256:7AC7A7FC3F6092670D8B6AD1AF251EF5D03335D57774E6B084ECCF28BBD680F7
                                                    SHA-512:FA664090B54FE4BBF139A3CCFCF1CB62027A683A8C008161827EDB292BFF252916112E73298A8D9A7176789404B08292ABA539265B98D8F0E130E794EDE49741
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...4..\..................$...........$.......$...@...........................'...........@......@....................&.......%..5...@&..D...................................................0&.....................D.%.@.....&......................text...(.$.......$................. ..`.itext...&....$..(....$............. ..`.data...4Z....$..\....$.............@....bss.....q...@%..........................idata...5....%..6....%.............@....didata.......&......R%.............@....edata........&......\%.............@..@.tls....D.... &..........................rdata..]....0&......^%.............@..@.rsrc....D...@&..D...`%.............@..@..............'.......&.............@..@........................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:InnoSetup Log Avidenta, version 0x418, 9185 bytes, 116938\37\user\376\, C:\Users\user\AppData\Local\Avidenta 2.8.8
                                                    Category:dropped
                                                    Size (bytes):9185
                                                    Entropy (8bit):3.8443917078448093
                                                    Encrypted:false
                                                    SSDEEP:192:qd1qWAdpaUXKJ7slwbP4D0mHYSMFzziKud8rc9tI9//7LO7KEyR0lYHl:MUWAeUXKJ7RbPCCG6Hl
                                                    MD5:031F58B9E076FC3CBB33A1FB057A54CC
                                                    SHA1:C12451CE573D59851A75B4E4503DAEFF96589098
                                                    SHA-256:FF612CAE135AEA3B3743F350AD382A5E8022496AF4D18E53558E2BEC0C8E4CA8
                                                    SHA-512:F5930FEDE60EBE5EF0F7720638814195DF79358ED306C1C4F1D979D33922F33BFFF92E904D021F5B34FB7A76CC83CADEB9C33B9CAF74738850F10257DB2B8140
                                                    Malicious:false
                                                    Preview:Inno Setup Uninstall Log (b)....................................Avidenta........................................................................................................................Avidenta.................................................................................................................................#..!...............................................................................................................S..2........{..6...............1.1.6.9.3.8......t.i.n.a......C.:.\.U.s.e.r.s.\.t.i.n.a.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.A.v.i.d.e.n.t.a. .2...8...8....................... ..............IFPS....$........................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TMAINFORM....TMAINFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM.........TPASSWORDEDIT....TPASSWORDEDIT.........
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):2555217
                                                    Entropy (8bit):6.364161494552352
                                                    Encrypted:false
                                                    SSDEEP:49152:gdrGT9oY0SAQ4+YI1Qb1oWGxblxZa0o8598j:gFGTv1QtGxHZabt
                                                    MD5:0F299B44F450181D8B1B058637377507
                                                    SHA1:11CE62C7229B835C838167D8E0F2D9F41B54ADAE
                                                    SHA-256:7AC7A7FC3F6092670D8B6AD1AF251EF5D03335D57774E6B084ECCF28BBD680F7
                                                    SHA-512:FA664090B54FE4BBF139A3CCFCF1CB62027A683A8C008161827EDB292BFF252916112E73298A8D9A7176789404B08292ABA539265B98D8F0E130E794EDE49741
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...4..\..................$...........$.......$...@...........................'...........@......@....................&.......%..5...@&..D...................................................0&.....................D.%.@.....&......................text...(.$.......$................. ..`.itext...&....$..(....$............. ..`.data...4Z....$..\....$.............@....bss.....q...@%..........................idata...5....%..6....%.............@....didata.......&......R%.............@....edata........&......\%.............@..@.tls....D.... &..........................rdata..]....0&......^%.............@..@.rsrc....D...@&..D...`%.............@..@..............'.......&.............@..@........................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):2560
                                                    Entropy (8bit):2.8818118453929262
                                                    Encrypted:false
                                                    SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                    MD5:A69559718AB506675E907FE49DEB71E9
                                                    SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                    SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                    SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):6144
                                                    Entropy (8bit):4.720366600008286
                                                    Encrypted:false
                                                    SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                    MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                    SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                    SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                    SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\i7j22nof2Q.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):2532352
                                                    Entropy (8bit):6.380212187829063
                                                    Encrypted:false
                                                    SSDEEP:49152:IdrGT9oY0SAQ4+YI1Qb1oWGxblxZa0o8598:IFGTv1QtGxHZab
                                                    MD5:438F4076E92D3C839405BAB4652FE2CE
                                                    SHA1:046567CF90B9E87F4B3913030E1ACFC0A4341279
                                                    SHA-256:AD1772BD4F07C11A626DE2F257D2CC44B63FF9150BE9386512840A2381E97B7E
                                                    SHA-512:44985FE1773CC9D1A4EE5ED0E5BCAC058C0CD064D3A1E782D9C424EFEB89185528E19A177ECFAFA173B76B049301D5FF95DAFC0B36715A0847EEC3F6B4E1506B
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...4..\..................$...........$.......$...@...........................'...........@......@....................&.......%..5...@&..D...................................................0&.....................D.%.@.....&......................text...(.$.......$................. ..`.itext...&....$..(....$............. ..`.data...4Z....$..\....$.............@....bss.....q...@%..........................idata...5....%..6....%.............@....didata.......&......R%.............@....edata........&......\%.............@..@.tls....D.... &..........................rdata..]....0&......^%.............@..@.rsrc....D...@&..D...`%.............@..@..............'.......&.............@..@........................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.952208607288448
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 98.04%
                                                    • Inno Setup installer (109748/4) 1.08%
                                                    • InstallShield setup (43055/19) 0.42%
                                                    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                    File name:i7j22nof2Q.exe
                                                    File size:6'692'550 bytes
                                                    MD5:ad01c8fa6ec2371dfd9f57200f84e13a
                                                    SHA1:0fb1d82d89253d853dcb0e5d66f4b0d2b067b48d
                                                    SHA256:5179029eb225a9937cc7507b084cc8418f4d84e3c99e13b5a2a0cc8fdba75bd3
                                                    SHA512:e46fb5132086fa003b36b0d73e94998e132a402a85ce18d8f02e6911e1a41946b11b77e7f214cb34c959ead6add677cb3842294c45e480580d66646b56b6368a
                                                    SSDEEP:98304:PX4jivxv97/nhks8jVQ9MNa3EgedZ64ymjXA7QjBMh5YwE4zwJozYyazx11:vagxvJPhks8CKaDQemzBBM4wEXoYyaR
                                                    TLSH:AF662227B249613EC46E27364673A45058FBB7A8F427BE1677F0C88DCF650C01E3AA65
                                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                    Icon Hash:2d2e3797b32b2b99
                                                    Entrypoint:0x4a7ed0
                                                    Entrypoint Section:.itext
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x5CC41133 [Sat Apr 27 08:22:11 2019 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:eb5bc6ff6263b364dfbfb78bdb48ed59
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    add esp, FFFFFFA4h
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    xor eax, eax
                                                    mov dword ptr [ebp-3Ch], eax
                                                    mov dword ptr [ebp-40h], eax
                                                    mov dword ptr [ebp-5Ch], eax
                                                    mov dword ptr [ebp-30h], eax
                                                    mov dword ptr [ebp-38h], eax
                                                    mov dword ptr [ebp-34h], eax
                                                    mov dword ptr [ebp-2Ch], eax
                                                    mov dword ptr [ebp-28h], eax
                                                    mov dword ptr [ebp-14h], eax
                                                    mov eax, 004A2BC0h
                                                    call 00007FE068B51FDDh
                                                    xor eax, eax
                                                    push ebp
                                                    push 004A85C2h
                                                    push dword ptr fs:[eax]
                                                    mov dword ptr fs:[eax], esp
                                                    xor edx, edx
                                                    push ebp
                                                    push 004A857Eh
                                                    push dword ptr fs:[edx]
                                                    mov dword ptr fs:[edx], esp
                                                    mov eax, dword ptr [004B0634h]
                                                    call 00007FE068BE60D7h
                                                    call 00007FE068BE5C2Eh
                                                    lea edx, dword ptr [ebp-14h]
                                                    xor eax, eax
                                                    call 00007FE068B67608h
                                                    mov edx, dword ptr [ebp-14h]
                                                    mov eax, 004B3708h
                                                    call 00007FE068B4C867h
                                                    push 00000002h
                                                    push 00000000h
                                                    push 00000001h
                                                    mov ecx, dword ptr [004B3708h]
                                                    mov dl, 01h
                                                    mov eax, dword ptr [00423698h]
                                                    call 00007FE068B6866Fh
                                                    mov dword ptr [004B370Ch], eax
                                                    xor edx, edx
                                                    push ebp
                                                    push 004A852Ah
                                                    push dword ptr fs:[edx]
                                                    mov dword ptr fs:[edx], esp
                                                    call 00007FE068BE615Fh
                                                    mov dword ptr [004B3714h], eax
                                                    mov eax, dword ptr [004B3714h]
                                                    cmp dword ptr [eax+0Ch], 01h
                                                    jne 00007FE068BECA1Ah
                                                    mov eax, dword ptr [004B3714h]
                                                    mov edx, 00000028h
                                                    call 00007FE068B68F64h
                                                    mov edx, dword ptr [004B3714h]
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0xb60000x9a.edata
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb40000xf1c.idata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb90000x4600.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0xb80000x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0xb42e00x240.idata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb50000x1a4.didata
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000xa50e00xa5200d2d65fadb7b1be676e1248ab404382daFalse0.3560172809424678data6.368250598681687IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .itext0xa70000x16680x180073e002411a8e0d309143a3e055e89568False0.5411783854166666data5.950488815097041IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .data0xa90000x37a40x380043e7b93b56ed2b1f2c341832da76e1f0False0.3604213169642857data5.027871318308703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .bss0xad0000x676c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .idata0xb40000xf1c0x1000daddecfdccd86a491d85012d9e547c63False0.36474609375data4.791610915860562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .didata0xb50000x1a40x200be0581a07bd7d21a29f93f8752d3e826False0.345703125data2.7458225536678693IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .edata0xb60000x9a0x20057cd71ca96fdc064696777e5b35cf0bbFalse0.2578125data1.881069204504408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .tls0xb70000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rdata0xb80000x5d0x200967e84eb6ac477621cd1643650d7bc91False0.189453125data1.3697437648744617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrc0xb90000x46000x46000fc551988a38dc612753140907d16278False0.31986607142857143data4.433667100169543IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xb94c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                    RT_ICON0xb95f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                    RT_ICON0xb9b580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                    RT_ICON0xb9e400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                    RT_STRING0xba6e80x360data0.34375
                                                    RT_STRING0xbaa480x260data0.3256578947368421
                                                    RT_STRING0xbaca80x45cdata0.4068100358422939
                                                    RT_STRING0xbb1040x40cdata0.3754826254826255
                                                    RT_STRING0xbb5100x2d4data0.39226519337016574
                                                    RT_STRING0xbb7e40xb8data0.6467391304347826
                                                    RT_STRING0xbb89c0x9cdata0.6410256410256411
                                                    RT_STRING0xbb9380x374data0.4230769230769231
                                                    RT_STRING0xbbcac0x398data0.3358695652173913
                                                    RT_STRING0xbc0440x368data0.3795871559633027
                                                    RT_STRING0xbc3ac0x2a4data0.4275147928994083
                                                    RT_RCDATA0xbc6500x10data1.5
                                                    RT_RCDATA0xbc6600x2c4data0.6384180790960452
                                                    RT_RCDATA0xbc9240x2cdata1.1818181818181819
                                                    RT_GROUP_ICON0xbc9500x3edataEnglishUnited States0.8387096774193549
                                                    RT_VERSION0xbc9900x584dataEnglishUnited States0.24645892351274787
                                                    RT_MANIFEST0xbcf140x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                                    DLLImport
                                                    kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                                    comctl32.dllInitCommonControls
                                                    version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                                                    user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                                    oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                                    netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                                                    advapi32.dllRegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                                                    NameOrdinalAddress
                                                    TMethodImplementationIntercept30x453abc
                                                    __dbk_fcall_wrapper20x40d3dc
                                                    dbkFCallWrapperAddr10x4b063c
                                                    Language of compilation systemCountry where language is spokenMap
                                                    DutchNetherlands
                                                    EnglishUnited States
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-11-15T17:25:15.488237+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949710185.208.158.20280TCP
                                                    2024-11-15T17:25:16.517420+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949711185.208.158.20280TCP
                                                    2024-11-15T17:25:19.747761+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949711185.208.158.20280TCP
                                                    2024-11-15T17:25:20.781819+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949713185.208.158.20280TCP
                                                    2024-11-15T17:25:21.829341+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949715185.208.158.20280TCP
                                                    2024-11-15T17:25:22.884065+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949716185.208.158.20280TCP
                                                    2024-11-15T17:25:23.303855+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949716185.208.158.20280TCP
                                                    2024-11-15T17:25:23.720551+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949716185.208.158.20280TCP
                                                    2024-11-15T17:25:24.765774+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949717185.208.158.20280TCP
                                                    2024-11-15T17:25:25.809295+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949718185.208.158.20280TCP
                                                    2024-11-15T17:25:26.918910+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949719185.208.158.20280TCP
                                                    2024-11-15T17:25:28.130423+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949720185.208.158.20280TCP
                                                    2024-11-15T17:25:29.165529+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949721185.208.158.20280TCP
                                                    2024-11-15T17:25:29.578428+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949721185.208.158.20280TCP
                                                    2024-11-15T17:25:30.640804+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949722185.208.158.20280TCP
                                                    2024-11-15T17:25:31.700049+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949723185.208.158.20280TCP
                                                    2024-11-15T17:25:33.703580+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949724185.208.158.20280TCP
                                                    2024-11-15T17:25:34.764778+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949725185.208.158.20280TCP
                                                    2024-11-15T17:25:35.791590+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949726185.208.158.20280TCP
                                                    2024-11-15T17:25:36.209969+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949726185.208.158.20280TCP
                                                    2024-11-15T17:25:37.353042+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949727185.208.158.20280TCP
                                                    2024-11-15T17:25:38.398773+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949728185.208.158.20280TCP
                                                    2024-11-15T17:25:38.819187+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949728185.208.158.20280TCP
                                                    2024-11-15T17:25:39.884726+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949729185.208.158.20280TCP
                                                    2024-11-15T17:25:40.306930+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949729185.208.158.20280TCP
                                                    2024-11-15T17:25:41.060962+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949729185.208.158.20280TCP
                                                    2024-11-15T17:25:42.462478+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949730185.208.158.20280TCP
                                                    2024-11-15T17:25:42.876613+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949730185.208.158.20280TCP
                                                    2024-11-15T17:25:43.925251+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949731185.208.158.20280TCP
                                                    2024-11-15T17:25:44.959529+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949732185.208.158.20280TCP
                                                    2024-11-15T17:25:45.391480+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949732185.208.158.20280TCP
                                                    2024-11-15T17:25:46.443060+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949733185.208.158.20280TCP
                                                    2024-11-15T17:25:47.483529+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949734185.208.158.20280TCP
                                                    2024-11-15T17:25:48.509317+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949735185.208.158.20280TCP
                                                    2024-11-15T17:25:48.919795+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949735185.208.158.20280TCP
                                                    2024-11-15T17:25:50.004223+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949736185.208.158.20280TCP
                                                    2024-11-15T17:25:51.022745+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949737185.208.158.20280TCP
                                                    2024-11-15T17:25:51.435958+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949737185.208.158.20280TCP
                                                    2024-11-15T17:25:52.493124+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949738185.208.158.20280TCP
                                                    2024-11-15T17:25:52.911237+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949738185.208.158.20280TCP
                                                    2024-11-15T17:25:53.950270+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949739185.208.158.20280TCP
                                                    2024-11-15T17:25:54.992378+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949740185.208.158.20280TCP
                                                    2024-11-15T17:25:55.412025+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949740185.208.158.20280TCP
                                                    2024-11-15T17:25:56.446147+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949741185.208.158.20280TCP
                                                    2024-11-15T17:25:57.555761+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949742185.208.158.20280TCP
                                                    2024-11-15T17:25:57.976783+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949742185.208.158.20280TCP
                                                    2024-11-15T17:25:58.405379+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949742185.208.158.20280TCP
                                                    2024-11-15T17:25:59.440168+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949743185.208.158.20280TCP
                                                    2024-11-15T17:26:00.475281+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949744185.208.158.20280TCP
                                                    2024-11-15T17:26:01.253247+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949744185.208.158.20280TCP
                                                    2024-11-15T17:26:02.307033+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949745185.208.158.20280TCP
                                                    2024-11-15T17:26:03.346268+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949746185.208.158.20280TCP
                                                    2024-11-15T17:26:04.405876+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949747185.208.158.20280TCP
                                                    2024-11-15T17:26:05.453159+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949748185.208.158.20280TCP
                                                    2024-11-15T17:26:06.517400+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949749185.208.158.20280TCP
                                                    2024-11-15T17:26:07.553501+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949750185.208.158.20280TCP
                                                    2024-11-15T17:26:08.666118+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949751185.208.158.20280TCP
                                                    2024-11-15T17:26:09.093843+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949751185.208.158.20280TCP
                                                    2024-11-15T17:26:10.138651+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949752185.208.158.20280TCP
                                                    2024-11-15T17:26:11.177320+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949753185.208.158.20280TCP
                                                    2024-11-15T17:26:12.224964+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949754185.208.158.20280TCP
                                                    2024-11-15T17:26:12.645092+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949754185.208.158.20280TCP
                                                    2024-11-15T17:26:13.662002+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949755185.208.158.20280TCP
                                                    2024-11-15T17:26:14.714239+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949756185.208.158.20280TCP
                                                    2024-11-15T17:26:15.131551+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949756185.208.158.20280TCP
                                                    2024-11-15T17:26:16.173876+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949757185.208.158.20280TCP
                                                    2024-11-15T17:26:17.224984+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949758185.208.158.20280TCP
                                                    2024-11-15T17:26:18.272171+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949759185.208.158.20280TCP
                                                    2024-11-15T17:26:19.404347+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949760185.208.158.20280TCP
                                                    2024-11-15T17:26:20.440481+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949761185.208.158.20280TCP
                                                    2024-11-15T17:26:21.490160+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949762185.208.158.20280TCP
                                                    2024-11-15T17:26:22.570609+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949763185.208.158.20280TCP
                                                    2024-11-15T17:26:23.652674+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.949764185.208.158.20280TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 15, 2024 17:25:14.568697929 CET4971080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:14.573887110 CET8049710185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:14.577887058 CET4971080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:14.578052998 CET4971080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:14.582931995 CET8049710185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:15.488131046 CET8049710185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:15.488236904 CET4971080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:15.603357077 CET4971080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:15.603804111 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:15.608799934 CET8049711185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:15.608884096 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:15.608980894 CET8049710185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:15.609008074 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:15.609047890 CET4971080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:15.613878965 CET8049711185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:16.517292976 CET8049711185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:16.517420053 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:16.518482924 CET497122023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:16.523502111 CET20234971289.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:16.523613930 CET497122023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:16.523663044 CET497122023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:16.528690100 CET20234971289.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:16.528774023 CET497122023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:16.533709049 CET20234971289.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:17.381730080 CET20234971289.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:17.428164959 CET497122023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:19.403789997 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:19.409028053 CET8049711185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:19.747629881 CET8049711185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:19.747761011 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:19.869307041 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:19.869745016 CET4971380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:19.874771118 CET8049713185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:19.874897957 CET8049711185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:19.874897003 CET4971380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:19.874977112 CET4971180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:19.875175953 CET4971380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:19.880021095 CET8049713185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:20.781738043 CET8049713185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:20.781819105 CET4971380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:20.782872915 CET497142023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:20.787766933 CET20234971489.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:20.787849903 CET497142023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:20.787899017 CET497142023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:20.787947893 CET497142023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:20.792773962 CET20234971489.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:20.835437059 CET20234971489.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:20.900557995 CET4971380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:20.900968075 CET4971580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:20.905885935 CET8049715185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:20.905994892 CET4971580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:20.906079054 CET8049713185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:20.906133890 CET4971380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:20.906295061 CET4971580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:20.911206961 CET8049715185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:21.382571936 CET20234971489.105.201.183192.168.2.9
                                                    Nov 15, 2024 17:25:21.382740974 CET497142023192.168.2.989.105.201.183
                                                    Nov 15, 2024 17:25:21.829226971 CET8049715185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:21.829340935 CET4971580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:21.963030100 CET4971580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:21.963449955 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:21.968374968 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:21.968465090 CET8049715185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:21.968492985 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:21.968530893 CET4971580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:21.968828917 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:21.973596096 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:22.883795023 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:22.884064913 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:22.994412899 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:22.999540091 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:23.303735018 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:23.303854942 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.416208982 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.421402931 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:23.720272064 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:23.720551014 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.853769064 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.854126930 CET4971780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.859139919 CET8049717185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:23.859236002 CET4971780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.859348059 CET4971780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.859817982 CET8049716185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:23.859864950 CET4971680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:23.864341021 CET8049717185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:24.765685081 CET8049717185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:24.765774012 CET4971780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:24.884776115 CET4971780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:24.885207891 CET4971880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:24.890094042 CET8049718185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:24.890176058 CET4971880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:24.890450001 CET8049717185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:24.890496969 CET4971780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:24.890739918 CET4971880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:24.895585060 CET8049718185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:25.809119940 CET8049718185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:25.809294939 CET4971880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:25.931655884 CET4971880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:25.931943893 CET4971980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:25.937177896 CET8049719185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:25.937313080 CET4971980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:25.937517881 CET4971980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:25.937623024 CET8049718185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:25.937689066 CET4971880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:25.942440033 CET8049719185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:26.918790102 CET8049719185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:26.918910027 CET4971980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:27.188724041 CET4971980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:27.195497990 CET8049719185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:27.195627928 CET4971980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:27.195943117 CET4972080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:27.201597929 CET8049720185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:27.201678038 CET4972080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:27.207644939 CET4972080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:27.212626934 CET8049720185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:28.130254984 CET8049720185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:28.130423069 CET4972080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:28.244203091 CET4972080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:28.244604111 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:28.249708891 CET8049720185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:28.249797106 CET8049721185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:28.249830961 CET4972080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:28.249876976 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:28.250087023 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:28.255007029 CET8049721185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:29.165357113 CET8049721185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:29.165529013 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.275408030 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.280761003 CET8049721185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:29.578353882 CET8049721185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:29.578428030 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.699053049 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.699532032 CET4972280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.704696894 CET8049721185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:29.704735041 CET8049722185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:29.704787016 CET4972180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.704848051 CET4972280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.709969044 CET4972280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:29.714807987 CET8049722185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:30.640737057 CET8049722185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:30.640804052 CET4972280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:30.759845972 CET4972280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:30.760220051 CET4972380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:30.765300035 CET8049723185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:30.765594006 CET8049722185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:30.765690088 CET4972280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:30.765702009 CET4972380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:30.765855074 CET4972380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:30.770662069 CET8049723185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:31.699965000 CET8049723185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:31.700048923 CET4972380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:31.822784901 CET4972380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:31.823232889 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:31.828222990 CET8049723185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:31.828322887 CET8049724185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:31.828454018 CET4972380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:31.828509092 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:31.828744888 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:31.833631039 CET8049724185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:33.703417063 CET8049724185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:33.703579903 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.703677893 CET8049724185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:33.703727961 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.703985929 CET8049724185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:33.704026937 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.704207897 CET8049724185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:33.704247952 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.829272032 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.829685926 CET4972580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.834650040 CET8049725185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:33.834708929 CET8049724185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:33.834784985 CET4972580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.834835052 CET4972480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.835067987 CET4972580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:33.839891911 CET8049725185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:34.764664888 CET8049725185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:34.764777899 CET4972580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:34.884886980 CET4972580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:34.885271072 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:34.890301943 CET8049725185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:34.890319109 CET8049726185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:34.890424967 CET4972580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:34.890491009 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:34.890702963 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:34.895529032 CET8049726185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:35.791491985 CET8049726185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:35.791589975 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:35.905647993 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:35.910727024 CET8049726185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:36.209738970 CET8049726185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:36.209969044 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:36.398942947 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:36.399333954 CET4972780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:36.404304981 CET8049727185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:36.404382944 CET4972780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:36.404515028 CET8049726185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:36.404573917 CET4972680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:36.412832022 CET4972780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:36.418015957 CET8049727185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:37.352880001 CET8049727185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:37.353041887 CET4972780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:37.478480101 CET4972780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:37.478813887 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:37.483779907 CET8049728185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:37.483871937 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:37.483980894 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:37.484002113 CET8049727185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:37.484056950 CET4972780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:37.488791943 CET8049728185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:38.398708105 CET8049728185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:38.398772955 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.518008947 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.523696899 CET8049728185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:38.819068909 CET8049728185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:38.819186926 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.947268009 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.947556019 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.954622984 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:38.954721928 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.954758883 CET8049728185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:38.954817057 CET4972880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.954912901 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:38.960385084 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:39.884511948 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:39.884726048 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:39.996216059 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:40.001240969 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:40.306827068 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:40.306930065 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:40.415600061 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:40.420651913 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:41.060801983 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:41.060961962 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:41.193089962 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:41.193476915 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:41.198369980 CET8049730185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:41.198432922 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:41.198472977 CET8049729185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:41.198520899 CET4972980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:41.198662043 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:41.203411102 CET8049730185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:42.462327003 CET8049730185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:42.462477922 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:42.576180935 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:42.581056118 CET8049730185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:42.876506090 CET8049730185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:42.876612902 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:42.994530916 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:42.995419025 CET4973180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:42.999869108 CET8049730185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:42.999941111 CET4973080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:43.000371933 CET8049731185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:43.000462055 CET4973180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:43.000627041 CET4973180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:43.005505085 CET8049731185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:43.925168991 CET8049731185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:43.925251007 CET4973180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:44.040714025 CET4973180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:44.041023016 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:44.046823978 CET8049731185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:44.046888113 CET4973180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:44.047070026 CET8049732185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:44.047138929 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:44.047250032 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:44.053836107 CET8049732185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:44.959342957 CET8049732185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:44.959528923 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.079432011 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.084311008 CET8049732185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:45.391027927 CET8049732185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:45.391479969 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.509926081 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.510154009 CET4973380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.515022993 CET8049733185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:45.515084028 CET4973380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.515230894 CET8049732185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:45.515312910 CET4973280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.515428066 CET4973380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:45.520205021 CET8049733185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:46.442795992 CET8049733185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:46.443059921 CET4973380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:46.556648016 CET4973380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:46.557163000 CET4973480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:46.562103987 CET8049734185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:46.562189102 CET4973480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:46.562336922 CET4973480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:46.563009977 CET8049733185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:46.563064098 CET4973380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:46.567209959 CET8049734185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:47.483452082 CET8049734185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:47.483529091 CET4973480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:47.602993965 CET4973480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:47.603406906 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:47.608370066 CET8049735185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:47.608470917 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:47.608572006 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:47.608992100 CET8049734185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:47.609050989 CET4973480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:47.613657951 CET8049735185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:48.509156942 CET8049735185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:48.509316921 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:48.619919062 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:48.624789000 CET8049735185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:48.919589043 CET8049735185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:48.919795036 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:49.048185110 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:49.048528910 CET4973680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:49.053554058 CET8049736185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:49.053612947 CET4973680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:49.053745031 CET8049735185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:49.053750038 CET4973680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:49.053788900 CET4973580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:49.059227943 CET8049736185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:50.003989935 CET8049736185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:50.004223108 CET4973680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:50.119434118 CET4973680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:50.119843960 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:50.124839067 CET8049736185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:50.125025034 CET4973680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:50.125284910 CET8049737185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:50.125416040 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:50.125956059 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:50.130846024 CET8049737185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:51.022595882 CET8049737185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:51.022744894 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.134629011 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.140176058 CET8049737185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:51.435843945 CET8049737185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:51.435957909 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.556740046 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.557147026 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.562211990 CET8049738185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:51.562457085 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.562465906 CET8049737185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:51.562521935 CET4973780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.562647104 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:51.568397999 CET8049738185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:52.493071079 CET8049738185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:52.493124008 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:52.603682041 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:52.608644962 CET8049738185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:52.911053896 CET8049738185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:52.911237001 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:53.025659084 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:53.025886059 CET4973980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:53.030822992 CET8049739185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:53.030924082 CET4973980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:53.031117916 CET4973980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:53.031267881 CET8049738185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:53.031326056 CET4973880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:53.035873890 CET8049739185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:53.950145960 CET8049739185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:53.950269938 CET4973980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:54.079140902 CET4973980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:54.079540968 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:54.084533930 CET8049740185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:54.084630966 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:54.084857941 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:54.089668036 CET8049740185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:54.090595007 CET8049739185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:54.090651035 CET4973980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:54.992309093 CET8049740185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:54.992377996 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.103746891 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.109267950 CET8049740185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:55.411870003 CET8049740185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:55.412024975 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.525629044 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.526020050 CET4974180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.531259060 CET8049741185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:55.531383991 CET4974180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.531505108 CET4974180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.531927109 CET8049740185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:55.531975031 CET4974080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:55.536552906 CET8049741185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:56.446052074 CET8049741185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:56.446146965 CET4974180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:56.619940996 CET4974180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:56.620470047 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:56.625510931 CET8049741185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:56.625533104 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:56.625607014 CET4974180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:56.625638962 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:56.625824928 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:56.630892992 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:57.555640936 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:57.555761099 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:57.665997982 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:57.671144962 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:57.976516008 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:57.976783037 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.088257074 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.093214989 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:58.405245066 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:58.405379057 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.525392056 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.525799990 CET4974380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.530715942 CET8049743185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:58.530826092 CET4974380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.530966043 CET8049742185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:58.531011105 CET4974280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.531132936 CET4974380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:58.537106037 CET8049743185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:59.440038919 CET8049743185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:59.440167904 CET4974380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:59.565263987 CET4974380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:59.569000006 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:59.570420980 CET8049743185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:59.570502996 CET4974380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:59.573887110 CET8049744185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:25:59.573946953 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:59.576061010 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:25:59.580882072 CET8049744185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:00.474960089 CET8049744185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:00.475281000 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:00.590584040 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:00.595851898 CET8049744185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:01.253109932 CET8049744185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:01.253247023 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:01.380275011 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:01.380815983 CET4974580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:01.385829926 CET8049745185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:01.385905027 CET8049744185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:01.385912895 CET4974580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:01.385951042 CET4974480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:01.386132956 CET4974580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:01.391094923 CET8049745185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:02.306951046 CET8049745185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:02.307033062 CET4974580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:02.433578968 CET4974580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:02.433959007 CET4974680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:02.439027071 CET8049746185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:02.439125061 CET4974680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:02.439238071 CET4974680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:02.439654112 CET8049745185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:02.439718962 CET4974580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:02.444114923 CET8049746185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:03.346044064 CET8049746185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:03.346267939 CET4974680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:03.464257956 CET4974680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:03.464689970 CET4974780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:03.469568968 CET8049746185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:03.469599962 CET8049747185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:03.469634056 CET4974680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:03.469676018 CET4974780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:03.474989891 CET4974780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:03.479891062 CET8049747185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:04.405653000 CET8049747185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:04.405875921 CET4974780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:04.525727987 CET4974780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:04.526091099 CET4974880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:04.530978918 CET8049747185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:04.531002045 CET8049748185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:04.531054020 CET4974780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:04.531107903 CET4974880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:04.604070902 CET4974880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:04.609146118 CET8049748185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:05.452861071 CET8049748185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:05.453159094 CET4974880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:05.574347019 CET4974880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:05.574975014 CET4974980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:05.580300093 CET8049748185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:05.580391884 CET4974880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:05.580663919 CET8049749185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:05.580744028 CET4974980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:05.580996037 CET4974980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:05.585985899 CET8049749185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:06.517332077 CET8049749185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:06.517400026 CET4974980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:06.634784937 CET4974980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:06.635205984 CET4975080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:06.640233040 CET8049750185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:06.640408993 CET4975080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:06.640608072 CET4975080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:06.643028021 CET8049749185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:06.643102884 CET4974980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:06.647803068 CET8049750185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:07.553356886 CET8049750185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:07.553500891 CET4975080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:07.752471924 CET4975080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:07.756081104 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:07.758336067 CET8049750185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:07.758423090 CET4975080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:07.761056900 CET8049751185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:07.761117935 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:07.763627052 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:07.768682003 CET8049751185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:08.665937901 CET8049751185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:08.666117907 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:08.776092052 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:08.781444073 CET8049751185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:09.090004921 CET8049751185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:09.093842983 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:09.212845087 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:09.213305950 CET4975280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:09.218292952 CET8049752185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:09.218360901 CET8049751185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:09.218384027 CET4975280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:09.218415022 CET4975180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:09.218560934 CET4975280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:09.223584890 CET8049752185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:10.138307095 CET8049752185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:10.138650894 CET4975280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:10.260082960 CET4975280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:10.260324955 CET4975380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:10.266319036 CET8049752185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:10.266407013 CET4975280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:10.266434908 CET8049753185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:10.266503096 CET4975380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:10.266657114 CET4975380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:10.271487951 CET8049753185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:11.177228928 CET8049753185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:11.177320004 CET4975380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:11.293904066 CET4975380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:11.294353962 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:11.299431086 CET8049754185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:11.299571991 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:11.299715042 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:11.300278902 CET8049753185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:11.300334930 CET4975380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:11.304694891 CET8049754185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:12.224812984 CET8049754185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:12.224963903 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.338037014 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.343425035 CET8049754185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:12.645009995 CET8049754185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:12.645092010 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.759870052 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.760235071 CET4975580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.765103102 CET8049755185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:12.765202999 CET8049754185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:12.765208006 CET4975580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.765250921 CET4975480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.765455008 CET4975580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:12.770260096 CET8049755185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:13.661818027 CET8049755185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:13.662002087 CET4975580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:13.775960922 CET4975580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:13.776294947 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:13.781092882 CET8049756185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:13.781173944 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:13.781445980 CET8049755185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:13.781491995 CET4975580192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:13.784981012 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:13.789936066 CET8049756185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:14.713978052 CET8049756185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:14.714238882 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:14.823463917 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:14.828392029 CET8049756185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:15.131406069 CET8049756185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:15.131551027 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:15.264238119 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:15.264619112 CET4975780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:15.269459963 CET8049757185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:15.269505978 CET8049756185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:15.269547939 CET4975780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:15.269572973 CET4975680192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:15.269809008 CET4975780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:15.274635077 CET8049757185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:16.173733950 CET8049757185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:16.173876047 CET4975780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:16.291282892 CET4975780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:16.291659117 CET4975880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:16.296688080 CET8049758185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:16.296808958 CET4975880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:16.296870947 CET8049757185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:16.296924114 CET4975780192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:16.297059059 CET4975880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:16.301959038 CET8049758185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:17.224796057 CET8049758185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:17.224983931 CET4975880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:17.346271992 CET4975880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:17.347184896 CET4975980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:17.351751089 CET8049758185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:17.351866007 CET4975880192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:17.352207899 CET8049759185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:17.352344036 CET4975980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:17.352478027 CET4975980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:17.357388020 CET8049759185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:18.272103071 CET8049759185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:18.272171021 CET4975980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:18.474235058 CET4975980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:18.474577904 CET4976080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:18.483563900 CET8049760185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:18.483722925 CET4976080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:18.483884096 CET4976080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:18.486407042 CET8049759185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:18.486485004 CET4975980192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:18.491213083 CET8049760185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:19.404278040 CET8049760185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:19.404346943 CET4976080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:19.528191090 CET4976080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:19.528604984 CET4976180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:19.533633947 CET8049761185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:19.533706903 CET4976180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:19.533870935 CET4976180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:19.534456968 CET8049760185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:19.534523964 CET4976080192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:19.538772106 CET8049761185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:20.440432072 CET8049761185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:20.440480947 CET4976180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:20.558901072 CET4976180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:20.559258938 CET4976280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:20.564097881 CET8049761185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:20.564119101 CET8049762185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:20.564187050 CET4976180192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:20.564282894 CET4976280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:20.567076921 CET4976280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:20.572227001 CET8049762185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:21.489876986 CET8049762185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:21.490159988 CET4976280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:21.637898922 CET4976280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:21.638258934 CET4976380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:21.643520117 CET8049762185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:21.643582106 CET4976280192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:21.643642902 CET8049763185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:21.643702030 CET4976380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:21.644222975 CET4976380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:21.649163961 CET8049763185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:22.570523977 CET8049763185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:22.570609093 CET4976380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:22.729538918 CET4976380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:22.729537964 CET4976480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:22.734621048 CET8049764185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:22.734719992 CET4976480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:22.734956026 CET4976480192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:22.735160112 CET8049763185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:22.735306025 CET4976380192.168.2.9185.208.158.202
                                                    Nov 15, 2024 17:26:22.741660118 CET8049764185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:23.652510881 CET8049764185.208.158.202192.168.2.9
                                                    Nov 15, 2024 17:26:23.652673960 CET4976480192.168.2.9185.208.158.202
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 15, 2024 17:25:14.014375925 CET6040553192.168.2.991.211.247.248
                                                    Nov 15, 2024 17:25:14.048444986 CET536040591.211.247.248192.168.2.9
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Nov 15, 2024 17:25:14.014375925 CET192.168.2.991.211.247.2480xfed6Standard query (0)bvubwie.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Nov 15, 2024 17:25:14.048444986 CET91.211.247.248192.168.2.90xfed6No error (0)bvubwie.com185.208.158.202A (IP address)IN (0x0001)false
                                                    • bvubwie.com
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.949710185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:14.578052998 CET314OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed94 HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:15.488131046 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:15 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.949711185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:15.609008074 CET314OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c440db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692386688f716c9ed94 HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:16.517292976 CET970INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:16 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 32 66 61 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 63 36 39 35 39 61 62 37 32 65 38 36 36 61 63 33 37 34 62 63 32 66 64 64 30 30 32 63 32 34 33 63 64 37 64 62 62 31 34 66 61 32 64 38 64 32 30 66 61 31 36 61 31 37 38 63 37 35 30 62 33 65 39 34 64 65 64 35 61 37 66 34 38 65 64 32 36 36 34 38 62 33 39 36 37 39 30 66 63 31 34 64 65 65 65 39 32 39 33 33 31 63 63 36 66 39 36 31 36 64 33 35 31 38 66 32 33 61 38 35 38 62 33 65 65 34 31 32 30 65 62 37 65 63 63 66 66 37 62 62 61 38 35 65 65 64 35 34 61 65 36 33 35 63 30 31 34 32 62 35 62 35 39 33 65 65 32 32 34 37 33 31 36 36 37 62 63 65 66 38 37 66 66 38 36 32 64 35 31 65 64 35 64 37 66 32 37 65 30 32 66 35 34 65 39 66 65 65 34 38 66 65 34 33 66 37 62 61 37 65 37 34 36 39 32 38 34 66 62 37 31 32 36 31 [TRUNCATED]
                                                    Data Ascii: 2fa67b68a8a3203a77b0418f55f677c81c459fe8bd2e91f1ef5a25ce91585bccfb5fbc40ad9088be8de2266e208a6bb9d592dec6959ab72e866ac374bc2fdd002c243cd7dbb14fa2d8d20fa16a178c750b3e94ded5a7f48ed26648b396790fc14deee929331cc6f9616d3518f23a858b3ee4120eb7eccff7bba85eed54ae635c0142b5b593ee224731667bcef87ff862d51ed5d7f27e02f54e9fee48fe43f7ba7e7469284fb71261bb876ed9dc8ac66d375042b346ead57cedda6312ca4cb0eba1eb8a433a6c4cf357e2e0ed330e012ead3a0064cd02111c557c5f2619827b6965ea2e9d2abde3921b966bce40985a2bc7450a187f421a6ff858501ec1de744814c6dd1b1c7f7d94a67a192ef3da76a8b0f29af22ca39dd970ace5db53a0d184fcbd266423956639bfd892226654f10c4c1b00e11fcd2a6e8d8336179e5398fc1050b4096abcc065245d07c6b5c3050eadbd1ccf0ca45cd79281691206bd571e8c2852ecf1098e3604d482290e1ccb6475cfd2288dd197705d83cc5fd94380
                                                    Nov 15, 2024 17:25:19.403789997 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:19.747629881 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:19 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.949713185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:19.875175953 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:20.781738043 CET826INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:20 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 32 36 61 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 62 39 30 63 64 65 64 31 38 30 31 65 61 61 36 35 30 66 34 30 31 64 37 66 61 38 31 65 66 39 34 38 37 34 64 38 62 34 38 64 36 66 62 64 39 33 32 32 39 61 31 34 62 65 30 64 36 63 37 31 31 32 61 65 61 37 37 35 38 61 64 37 65 66 37 36 35 61 61 32 64 35 37 63 30 65 30 64 30 30 64 64 65 34 32 63 61 37 34 62 61 31 31 66 66 33 33 38 61 32 64 65 35 31 30 61 66 37 38 63 34 35 33 62 63 66 64 34 66 65 62 35 66 36 31 34 31 65 65 32 37 36 64 39 34 33 62 36 37 38 65 66 34 31 38 63 32 66 31 39 33 39 39 32 35 63 63 36 65 39 37 30 38 64 39 35 35 38 63 32 30 62 37 35 39 62 33 65 39 35 34 32 30 65 39 37 64 63 63 66 38 37 30 61 37 38 64 65 63 64 36 35 34 65 37 33 65 63 61 31 63 33 34 35 64 35 61 32 30 65 38 32 34 37 61 30 64 37 38 62 62 65 39 38 65 65 30 38 35 32 66 34 66 65 37 35 66 37 65 32 62 66 66 32 61 35 64 66 37 66 37 65 66 38 65 65 34 33 63 37 62 61 36 66 33 34 36 39 34 38 35 65 35 37 62 32 33 31 [TRUNCATED]
                                                    Data Ascii: 26a67b69c953804b26b565fe95b321bd19a55fb90cded1801eaa650f401d7fa81ef94874d8b48d6fbd93229a14be0d6c7112aea7758ad7ef765aa2d57c0e0d00dde42ca74ba11ff338a2de510af78c453bcfd4feb5f6141ee276d943b678ef418c2f1939925cc6e9708d9558c20b759b3e95420e97dccf870a78decd654e73eca1c345d5a20e8247a0d78bbe98ee0852f4fe75f7e2bff2a5df7f7ef8ee43c7ba6f3469485e57b2316b76cef98cbb964d5691b293266b255cfdfb3382cbfc30fb800b9a930bbdbc93273340fda33f511eed6b4064fd23f18c555d8ed629428a9975ea3fcd4aeca3a23be78b6ec0d93bebe7344a487ea20adf68f831fed1feb5e9e4d69c7abc3f9de5466a691e43faf74820c36b520d53cc39e05cc43b733021652cad76e573a5a609bfd8a2b32664c0ec6c8b21013fde60


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.949715185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:20.906295061 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:21.829226971 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:21 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.949716185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:21.968828917 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:22.883795023 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:22 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:22.994412899 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:23.303735018 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:23 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:23.416208982 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:23.720272064 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:23 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.949717185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:23.859348059 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:24.765685081 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:24 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.949718185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:24.890739918 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:25.809119940 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:25 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.949719185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:25.937517881 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:26.918790102 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:26 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    8192.168.2.949720185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:27.207644939 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:28.130254984 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:27 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    9192.168.2.949721185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:28.250087023 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:29.165357113 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:29 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:29.275408030 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:29.578353882 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:29 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    10192.168.2.949722185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:29.709969044 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:30.640737057 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:30 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    11192.168.2.949723185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:30.765855074 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:31.699965000 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:31 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    12192.168.2.949724185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:31.828744888 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:33.703417063 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:32 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:33.703677893 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:32 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:33.703985929 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:32 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:33.704207897 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:32 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    13192.168.2.949725185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:33.835067987 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:34.764664888 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:34 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    14192.168.2.949726185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:34.890702963 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:35.791491985 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:35 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:35.905647993 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:36.209738970 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:36 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    15192.168.2.949727185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:36.412832022 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:37.352880001 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:37 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    16192.168.2.949728185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:37.483980894 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:38.398708105 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:38 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:38.518008947 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:38.819068909 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:38 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    17192.168.2.949729185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:38.954912901 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:39.884511948 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:39 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:39.996216059 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:40.306827068 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:40 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:40.415600061 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:41.060801983 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:40 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    18192.168.2.949730185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:41.198662043 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:42.462327003 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:42 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:42.576180935 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:42.876506090 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:42 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    19192.168.2.949731185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:43.000627041 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:43.925168991 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:43 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    20192.168.2.949732185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:44.047250032 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:44.959342957 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:44 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:45.079432011 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:45.391027927 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:45 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    21192.168.2.949733185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:45.515428066 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:46.442795992 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:46 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    22192.168.2.949734185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:46.562336922 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:47.483452082 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:47 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    23192.168.2.949735185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:47.608572006 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:48.509156942 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:48 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:48.619919062 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:48.919589043 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:48 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    24192.168.2.949736185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:49.053750038 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:50.003989935 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:49 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    25192.168.2.949737185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:50.125956059 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:51.022595882 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:50 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:51.134629011 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:51.435843945 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:51 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    26192.168.2.949738185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:51.562647104 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:52.493071079 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:52 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:52.603682041 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:52.911053896 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:52 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    27192.168.2.949739185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:53.031117916 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:53.950145960 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:53 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    28192.168.2.949740185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:54.084857941 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:54.992309093 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:54 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:55.103746891 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:55.411870003 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:55 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    29192.168.2.949741185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:55.531505108 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:56.446052074 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:56 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    30192.168.2.949742185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:56.625824928 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:57.555640936 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:57 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:57.665997982 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:57.976516008 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:57 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:25:58.088257074 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:58.405245066 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:58 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    31192.168.2.949743185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:58.531132936 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:25:59.440038919 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:25:59 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    32192.168.2.949744185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:25:59.576061010 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:00.474960089 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:00 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:26:00.590584040 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:01.253109932 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:01 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    33192.168.2.949745185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:01.386132956 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:02.306951046 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:02 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    34192.168.2.949746185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:02.439238071 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:03.346044064 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:03 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    35192.168.2.949747185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:03.474989891 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:04.405653000 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:04 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    36192.168.2.949748185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:04.604070902 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:05.452861071 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:05 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    37192.168.2.949749185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:05.580996037 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:06.517332077 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:06 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    38192.168.2.949750185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:06.640608072 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:07.553356886 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:07 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    39192.168.2.949751185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:07.763627052 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:08.665937901 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:08 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:26:08.776092052 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:09.090004921 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:08 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    40192.168.2.949752185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:09.218560934 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:10.138307095 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:10 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    41192.168.2.949753185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:10.266657114 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:11.177228928 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:11 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    42192.168.2.949754185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:11.299715042 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:12.224812984 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:12 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:26:12.338037014 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:12.645009995 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:12 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    43192.168.2.949755185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:12.765455008 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:13.661818027 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:13 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    44192.168.2.949756185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:13.784981012 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:14.713978052 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:14 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20
                                                    Nov 15, 2024 17:26:14.823463917 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:15.131406069 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:15 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    45192.168.2.949757185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:15.269809008 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:16.173733950 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:16 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    46192.168.2.949758185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:16.297059059 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:17.224796057 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:17 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    47192.168.2.949759185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:17.352478027 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:18.272103071 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:18 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    48192.168.2.949760185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:18.483884096 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:19.404278040 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:19 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    49192.168.2.949761185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:19.533870935 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:20.440432072 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:20 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    50192.168.2.949762185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:20.567076921 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:21.489876986 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:21 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    51192.168.2.949763185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:21.644222975 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:22.570523977 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:22 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    52192.168.2.949764185.208.158.202807624C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Nov 15, 2024 17:26:22.734956026 CET320OUTGET /search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e492844896148ab2865b77f80ebad9910f7cb63037ed2ab423a4324383ba915d911ec079b306a0708720fa12b86fc753bbf51aba1e7242fa7023cc366689fc10c6e7929339cc HTTP/1.1
                                                    Host: bvubwie.com
                                                    User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                    Nov 15, 2024 17:26:23.652510881 CET220INHTTP/1.1 200 OK
                                                    Server: nginx/1.20.1
                                                    Date: Fri, 15 Nov 2024 16:26:23 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    X-Powered-By: PHP/7.4.33
                                                    Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: e67b680813008c20


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:11:24:17
                                                    Start date:15/11/2024
                                                    Path:C:\Users\user\Desktop\i7j22nof2Q.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\i7j22nof2Q.exe"
                                                    Imagebase:0x400000
                                                    File size:6'692'550 bytes
                                                    MD5 hash:AD01C8FA6EC2371DFD9F57200F84E13A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:2
                                                    Start time:11:24:17
                                                    Start date:15/11/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\is-C5FIO.tmp\i7j22nof2Q.tmp" /SL5="$20410,5992012,721408,C:\Users\user\Desktop\i7j22nof2Q.exe"
                                                    Imagebase:0x400000
                                                    File size:2'532'352 bytes
                                                    MD5 hash:438F4076E92D3C839405BAB4652FE2CE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:3
                                                    Start time:11:24:20
                                                    Start date:15/11/2024
                                                    Path:C:\Windows\SysWOW64\net.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\system32\net.exe" pause avidenta_11132
                                                    Imagebase:0xe30000
                                                    File size:47'104 bytes
                                                    MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:11:24:20
                                                    Start date:15/11/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff70f010000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:11:24:20
                                                    Start date:15/11/2024
                                                    Path:C:\Windows\SysWOW64\net1.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\system32\net1 pause avidenta_11132
                                                    Imagebase:0xdb0000
                                                    File size:139'776 bytes
                                                    MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:11:24:20
                                                    Start date:15/11/2024
                                                    Path:C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Avidenta 2.8.8\avidenta32.exe" -i
                                                    Imagebase:0x400000
                                                    File size:3'805'184 bytes
                                                    MD5 hash:5F301B2942D42D35402C384009767E5F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000006.00000002.2630520865.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 67%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:false

                                                    Reset < >
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.2632756843.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.2632741720.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.2632772175.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_i7j22nof2Q.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                      • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                      • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                      • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.2632756843.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000002.00000002.2632741720.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000002.00000002.2632772175.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_10000000_i7j22nof2Q.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                      • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                      • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                      • Instruction Fuzzy Hash:

                                                      Execution Graph

                                                      Execution Coverage:9.7%
                                                      Dynamic/Decrypted Code Coverage:83.7%
                                                      Signature Coverage:4.9%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:41
                                                      execution_graph 19199 2ca648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19277 2ca42c7 19199->19277 19278 402785 19279 402707 19278->19279 19281 40271b 19278->19281 19280 40272a lstrcmpiW 19279->19280 19279->19281 19282 402738 19280->19282 19281->19281 19283 2ca104d 19288 2cb33b4 19283->19288 19294 2cb32b8 19288->19294 19290 2ca1057 19291 2ca1aa9 InterlockedIncrement 19290->19291 19292 2ca105c 19291->19292 19293 2ca1ac5 WSAStartup InterlockedExchange 19291->19293 19293->19292 19295 2cb32c4 __fsopen 19294->19295 19302 2cb85a2 19295->19302 19301 2cb32eb __fsopen 19301->19290 19319 2cb88fd 19302->19319 19304 2cb32cd 19305 2cb32fc RtlDecodePointer RtlDecodePointer 19304->19305 19306 2cb32d9 19305->19306 19307 2cb3329 19305->19307 19316 2cb32f6 19306->19316 19307->19306 19618 2cb916d 19307->19618 19309 2cb338c RtlEncodePointer RtlEncodePointer 19309->19306 19310 2cb333b 19310->19309 19312 2cb3360 19310->19312 19625 2cb8b0b 19310->19625 19312->19306 19313 2cb8b0b __realloc_crt 62 API calls 19312->19313 19314 2cb337a RtlEncodePointer 19312->19314 19315 2cb3374 19313->19315 19314->19309 19315->19306 19315->19314 19652 2cb85ab 19316->19652 19320 2cb890e 19319->19320 19321 2cb8921 RtlEnterCriticalSection 19319->19321 19326 2cb8985 19320->19326 19321->19304 19323 2cb8914 19323->19321 19348 2cb844f 19323->19348 19327 2cb8991 __fsopen 19326->19327 19328 2cb89b0 19327->19328 19355 2cb86e3 19327->19355 19337 2cb89d3 __fsopen 19328->19337 19402 2cb8ac4 19328->19402 19334 2cb89a6 19399 2cb832c 19334->19399 19335 2cb89ce 19407 2cb5e6b 19335->19407 19336 2cb89dd 19340 2cb88fd __lock 59 API calls 19336->19340 19337->19323 19341 2cb89e4 19340->19341 19342 2cb8a09 19341->19342 19343 2cb89f1 19341->19343 19413 2cb2f84 19342->19413 19410 2cb921c 19343->19410 19346 2cb89fd 19419 2cb8a25 19346->19419 19349 2cb86e3 __FF_MSGBANNER 59 API calls 19348->19349 19350 2cb8457 19349->19350 19351 2cb8740 __NMSG_WRITE 59 API calls 19350->19351 19352 2cb845f 19351->19352 19588 2cb84fe 19352->19588 19422 2cc018e 19355->19422 19357 2cb86ea 19358 2cc018e __NMSG_WRITE 59 API calls 19357->19358 19361 2cb86f7 19357->19361 19358->19361 19359 2cb8740 __NMSG_WRITE 59 API calls 19360 2cb870f 19359->19360 19362 2cb8740 __NMSG_WRITE 59 API calls 19360->19362 19361->19359 19363 2cb8719 19361->19363 19362->19363 19364 2cb8740 19363->19364 19365 2cb875e __NMSG_WRITE 19364->19365 19367 2cc018e __NMSG_WRITE 55 API calls 19365->19367 19398 2cb8885 19365->19398 19369 2cb8771 19367->19369 19368 2cb88ee 19368->19334 19370 2cb888a GetStdHandle 19369->19370 19371 2cc018e __NMSG_WRITE 55 API calls 19369->19371 19374 2cb8898 _strlen 19370->19374 19370->19398 19372 2cb8782 19371->19372 19372->19370 19373 2cb8794 19372->19373 19373->19398 19444 2cbf54d 19373->19444 19376 2cb88d1 WriteFile 19374->19376 19374->19398 19376->19398 19378 2cb88f2 19381 2cb4f15 __invoke_watson 8 API calls 19378->19381 19379 2cb87c1 GetModuleFileNameW 19380 2cb87e1 19379->19380 19385 2cb87f1 __NMSG_WRITE 19379->19385 19382 2cbf54d __NMSG_WRITE 55 API calls 19380->19382 19383 2cb88fc 19381->19383 19382->19385 19384 2cb8921 RtlEnterCriticalSection 19383->19384 19387 2cb8985 __mtinitlocknum 55 API calls 19383->19387 19384->19334 19385->19378 19391 2cb8837 19385->19391 19453 2cbf5c2 19385->19453 19389 2cb8914 19387->19389 19389->19384 19393 2cb844f __amsg_exit 55 API calls 19389->19393 19391->19378 19462 2cbf4e1 19391->19462 19392 2cbf4e1 __NMSG_WRITE 55 API calls 19394 2cb886e 19392->19394 19395 2cb8920 19393->19395 19394->19378 19396 2cb8875 19394->19396 19395->19384 19471 2cc01ce RtlEncodePointer 19396->19471 19496 2cb455b 19398->19496 19511 2cb82f8 GetModuleHandleExW 19399->19511 19404 2cb8ad2 19402->19404 19405 2cb89c7 19404->19405 19514 2cb2fbc 19404->19514 19531 2cb9515 Sleep 19404->19531 19405->19335 19405->19336 19534 2cb5c82 GetLastError 19407->19534 19409 2cb5e70 19409->19337 19411 2cb9239 InitializeCriticalSectionAndSpinCount 19410->19411 19412 2cb922c 19410->19412 19411->19346 19412->19346 19414 2cb2fb6 __dosmaperr 19413->19414 19415 2cb2f8d HeapFree 19413->19415 19414->19346 19415->19414 19416 2cb2fa2 19415->19416 19417 2cb5e6b __cftof2_l 57 API calls 19416->19417 19418 2cb2fa8 GetLastError 19417->19418 19418->19414 19587 2cb8a67 RtlLeaveCriticalSection 19419->19587 19421 2cb8a2c 19421->19337 19423 2cc0198 19422->19423 19424 2cb5e6b __cftof2_l 59 API calls 19423->19424 19425 2cc01a2 19423->19425 19426 2cc01be 19424->19426 19425->19357 19429 2cb4f05 19426->19429 19432 2cb4eda RtlDecodePointer 19429->19432 19433 2cb4eed 19432->19433 19438 2cb4f15 IsProcessorFeaturePresent 19433->19438 19436 2cb4eda __cftof2_l 8 API calls 19437 2cb4f11 19436->19437 19437->19357 19439 2cb4f20 19438->19439 19440 2cb4da8 __call_reportfault 7 API calls 19439->19440 19441 2cb4f35 19440->19441 19442 2cb9523 __invoke_watson GetCurrentProcess TerminateProcess 19441->19442 19443 2cb4f04 19442->19443 19443->19436 19445 2cbf566 19444->19445 19446 2cbf558 19444->19446 19447 2cb5e6b __cftof2_l 59 API calls 19445->19447 19446->19445 19448 2cbf57f 19446->19448 19452 2cbf570 19447->19452 19450 2cb87b4 19448->19450 19451 2cb5e6b __cftof2_l 59 API calls 19448->19451 19449 2cb4f05 __cftof2_l 9 API calls 19449->19450 19450->19378 19450->19379 19451->19452 19452->19449 19458 2cbf5d0 19453->19458 19454 2cbf5d4 19455 2cb5e6b __cftof2_l 59 API calls 19454->19455 19456 2cbf5d9 19454->19456 19457 2cbf604 19455->19457 19456->19391 19459 2cb4f05 __cftof2_l 9 API calls 19457->19459 19458->19454 19458->19456 19460 2cbf613 19458->19460 19459->19456 19460->19456 19461 2cb5e6b __cftof2_l 59 API calls 19460->19461 19461->19457 19463 2cbf4fb 19462->19463 19465 2cbf4ed 19462->19465 19464 2cb5e6b __cftof2_l 59 API calls 19463->19464 19470 2cbf505 19464->19470 19465->19463 19468 2cbf527 19465->19468 19466 2cb4f05 __cftof2_l 9 API calls 19467 2cb8857 19466->19467 19467->19378 19467->19392 19468->19467 19469 2cb5e6b __cftof2_l 59 API calls 19468->19469 19469->19470 19470->19466 19472 2cc0202 ___crtIsPackagedApp 19471->19472 19473 2cc02c1 IsDebuggerPresent 19472->19473 19474 2cc0211 LoadLibraryExW 19472->19474 19475 2cc02cb 19473->19475 19476 2cc02e6 19473->19476 19477 2cc024e GetProcAddress 19474->19477 19478 2cc0228 GetLastError 19474->19478 19479 2cc02d9 19475->19479 19480 2cc02d2 OutputDebugStringW 19475->19480 19476->19479 19481 2cc02eb RtlDecodePointer 19476->19481 19483 2cc0262 7 API calls 19477->19483 19484 2cc02de 19477->19484 19482 2cc0237 LoadLibraryExW 19478->19482 19478->19484 19479->19484 19490 2cc0312 RtlDecodePointer RtlDecodePointer 19479->19490 19494 2cc032a 19479->19494 19480->19479 19481->19484 19482->19477 19482->19484 19485 2cc02be 19483->19485 19486 2cc02aa GetProcAddress RtlEncodePointer 19483->19486 19487 2cb455b __NMSG_WRITE 6 API calls 19484->19487 19485->19473 19486->19485 19491 2cc03b0 19487->19491 19488 2cc034e RtlDecodePointer 19488->19484 19489 2cc0362 RtlDecodePointer 19489->19488 19490->19494 19491->19398 19494->19488 19494->19489 19497 2cb4563 19496->19497 19498 2cb4565 IsProcessorFeaturePresent 19496->19498 19497->19368 19500 2cb959f 19498->19500 19503 2cb954e IsDebuggerPresent 19500->19503 19504 2cb9563 __call_reportfault 19503->19504 19509 2cb9538 SetUnhandledExceptionFilter UnhandledExceptionFilter 19504->19509 19506 2cb956b __call_reportfault 19510 2cb9523 GetCurrentProcess TerminateProcess 19506->19510 19508 2cb9588 19508->19368 19509->19506 19510->19508 19512 2cb8323 ExitProcess 19511->19512 19513 2cb8311 GetProcAddress 19511->19513 19513->19512 19515 2cb3037 19514->19515 19526 2cb2fc8 19514->19526 19516 2cb8213 __calloc_impl RtlDecodePointer 19515->19516 19517 2cb303d 19516->19517 19518 2cb5e6b __cftof2_l 58 API calls 19517->19518 19530 2cb302f 19518->19530 19519 2cb86e3 __FF_MSGBANNER 58 API calls 19528 2cb2fd3 19519->19528 19520 2cb2ffb RtlAllocateHeap 19520->19526 19520->19530 19521 2cb8740 __NMSG_WRITE 58 API calls 19521->19528 19522 2cb3023 19524 2cb5e6b __cftof2_l 58 API calls 19522->19524 19527 2cb3021 19524->19527 19525 2cb832c _doexit 3 API calls 19525->19528 19526->19520 19526->19522 19526->19527 19526->19528 19532 2cb8213 RtlDecodePointer 19526->19532 19529 2cb5e6b __cftof2_l 58 API calls 19527->19529 19528->19519 19528->19521 19528->19525 19528->19526 19529->19530 19530->19404 19531->19404 19533 2cb8226 19532->19533 19533->19526 19548 2cb91db 19534->19548 19536 2cb5c97 19537 2cb5ce5 SetLastError 19536->19537 19551 2cb8a7c 19536->19551 19537->19409 19541 2cb5cbe 19542 2cb5cdc 19541->19542 19543 2cb5cc4 19541->19543 19545 2cb2f84 _free 56 API calls 19542->19545 19560 2cb5cf1 19543->19560 19547 2cb5ce2 19545->19547 19546 2cb5ccc GetCurrentThreadId 19546->19537 19547->19537 19549 2cb91ee 19548->19549 19550 2cb91f2 TlsGetValue 19548->19550 19549->19536 19550->19536 19552 2cb8a83 19551->19552 19554 2cb5caa 19552->19554 19556 2cb8aa1 19552->19556 19570 2cc04c8 19552->19570 19554->19537 19557 2cb91fa 19554->19557 19556->19552 19556->19554 19578 2cb9515 Sleep 19556->19578 19558 2cb9210 19557->19558 19559 2cb9214 TlsSetValue 19557->19559 19558->19541 19559->19541 19561 2cb5cfd __fsopen 19560->19561 19562 2cb88fd __lock 59 API calls 19561->19562 19563 2cb5d3a 19562->19563 19579 2cb5d92 19563->19579 19566 2cb88fd __lock 59 API calls 19567 2cb5d5b ___addlocaleref 19566->19567 19582 2cb5d9b 19567->19582 19569 2cb5d86 __fsopen 19569->19546 19571 2cc04d3 19570->19571 19576 2cc04ee 19570->19576 19572 2cc04df 19571->19572 19571->19576 19573 2cb5e6b __cftof2_l 58 API calls 19572->19573 19575 2cc04e4 19573->19575 19574 2cc04fe RtlAllocateHeap 19574->19575 19574->19576 19575->19552 19576->19574 19576->19575 19577 2cb8213 __calloc_impl RtlDecodePointer 19576->19577 19577->19576 19578->19556 19585 2cb8a67 RtlLeaveCriticalSection 19579->19585 19581 2cb5d54 19581->19566 19586 2cb8a67 RtlLeaveCriticalSection 19582->19586 19584 2cb5da2 19584->19569 19585->19581 19586->19584 19587->19421 19591 2cb85b4 19588->19591 19590 2cb846a 19592 2cb85c0 __fsopen 19591->19592 19593 2cb88fd __lock 52 API calls 19592->19593 19594 2cb85c7 19593->19594 19595 2cb85f5 RtlDecodePointer 19594->19595 19598 2cb8680 _doexit 19594->19598 19597 2cb860c RtlDecodePointer 19595->19597 19595->19598 19604 2cb861c 19597->19604 19611 2cb86ce 19598->19611 19600 2cb86dd __fsopen 19600->19590 19602 2cb8629 RtlEncodePointer 19602->19604 19603 2cb86c5 19605 2cb86ce 19603->19605 19606 2cb832c _doexit 3 API calls 19603->19606 19604->19598 19604->19602 19608 2cb8639 RtlDecodePointer RtlEncodePointer 19604->19608 19607 2cb86db 19605->19607 19616 2cb8a67 RtlLeaveCriticalSection 19605->19616 19606->19605 19607->19590 19610 2cb864b RtlDecodePointer RtlDecodePointer 19608->19610 19610->19604 19612 2cb86ae 19611->19612 19613 2cb86d4 19611->19613 19612->19600 19615 2cb8a67 RtlLeaveCriticalSection 19612->19615 19617 2cb8a67 RtlLeaveCriticalSection 19613->19617 19615->19603 19616->19607 19617->19612 19619 2cb918b RtlSizeHeap 19618->19619 19620 2cb9176 19618->19620 19619->19310 19621 2cb5e6b __cftof2_l 59 API calls 19620->19621 19622 2cb917b 19621->19622 19623 2cb4f05 __cftof2_l 9 API calls 19622->19623 19624 2cb9186 19623->19624 19624->19310 19629 2cb8b12 19625->19629 19627 2cb8b4f 19627->19312 19629->19627 19630 2cc03b4 19629->19630 19651 2cb9515 Sleep 19629->19651 19631 2cc03bd 19630->19631 19632 2cc03c8 19630->19632 19633 2cb2fbc _malloc 59 API calls 19631->19633 19634 2cc03d0 19632->19634 19643 2cc03dd 19632->19643 19635 2cc03c5 19633->19635 19636 2cb2f84 _free 59 API calls 19634->19636 19635->19629 19638 2cc03d8 __dosmaperr 19636->19638 19637 2cc0415 19640 2cb8213 __calloc_impl RtlDecodePointer 19637->19640 19638->19629 19639 2cc03e5 RtlReAllocateHeap 19639->19638 19639->19643 19641 2cc041b 19640->19641 19644 2cb5e6b __cftof2_l 59 API calls 19641->19644 19642 2cc0445 19646 2cb5e6b __cftof2_l 59 API calls 19642->19646 19643->19637 19643->19639 19643->19642 19645 2cb8213 __calloc_impl RtlDecodePointer 19643->19645 19648 2cc042d 19643->19648 19644->19638 19645->19643 19647 2cc044a GetLastError 19646->19647 19647->19638 19649 2cb5e6b __cftof2_l 59 API calls 19648->19649 19650 2cc0432 GetLastError 19649->19650 19650->19638 19651->19629 19655 2cb8a67 RtlLeaveCriticalSection 19652->19655 19654 2cb32fb 19654->19301 19655->19654 19656 2cdfa44 19657 2cdfa67 WriteFile 19656->19657 19659 2ce0ed2 19657->19659 19660 40d94a RegCloseKey 19661 2ce33c2 19662 2cfaa49 DeleteFileA 19661->19662 19663 2d169ea Sleep 19662->19663 19665 402bcc CreateDirectoryA 19666 40dabc 19665->19666 19667 40d256 CopyFileA 19668 403220 GetVersion 19692 404364 HeapCreate 19668->19692 19670 40327f 19671 403284 19670->19671 19672 40328c 19670->19672 19767 40333b 19671->19767 19704 404044 19672->19704 19676 403294 GetCommandLineA 19718 403f12 19676->19718 19680 4032ae 19750 403c0c 19680->19750 19682 4032b3 19683 4032b8 GetStartupInfoA 19682->19683 19763 403bb4 19683->19763 19685 4032ca GetModuleHandleA 19687 4032ee 19685->19687 19773 40395b 19687->19773 19693 404384 19692->19693 19694 4043ba 19692->19694 19780 40421c 19693->19780 19694->19670 19697 4043a0 19700 4043bd 19697->19700 19794 404f8c 19697->19794 19698 404393 19792 40473b HeapAlloc 19698->19792 19700->19670 19702 40439d 19702->19700 19703 4043ae HeapDestroy 19702->19703 19703->19694 19857 40335f 19704->19857 19707 404063 GetStartupInfoA 19714 404174 19707->19714 19717 4040af 19707->19717 19710 40419b GetStdHandle 19712 4041a9 GetFileType 19710->19712 19710->19714 19711 4041db SetHandleCount 19711->19676 19712->19714 19713 40335f 12 API calls 19713->19717 19714->19710 19714->19711 19715 404120 19715->19714 19716 404142 GetFileType 19715->19716 19716->19715 19717->19713 19717->19714 19717->19715 19719 403f60 19718->19719 19720 403f2d GetEnvironmentStringsW 19718->19720 19722 403f35 19719->19722 19725 403f51 19719->19725 19721 403f41 GetEnvironmentStrings 19720->19721 19720->19722 19724 4032a4 19721->19724 19721->19725 19723 403f6d GetEnvironmentStringsW 19722->19723 19728 403f79 19722->19728 19723->19724 19723->19728 19741 403cc5 19724->19741 19725->19724 19726 403ff3 GetEnvironmentStrings 19725->19726 19727 403fff 19725->19727 19726->19724 19726->19727 19732 40335f 12 API calls 19727->19732 19728->19728 19729 403f8e WideCharToMultiByte 19728->19729 19730 403fad 19729->19730 19731 403fdf FreeEnvironmentStringsW 19729->19731 19733 40335f 12 API calls 19730->19733 19731->19724 19739 40401a 19732->19739 19734 403fb3 19733->19734 19734->19731 19735 403fbc WideCharToMultiByte 19734->19735 19737 403fd6 19735->19737 19738 403fcd 19735->19738 19736 404030 FreeEnvironmentStringsA 19736->19724 19737->19731 19923 403411 19738->19923 19739->19736 19742 403cd7 19741->19742 19743 403cdc GetModuleFileNameA 19741->19743 19953 406524 19742->19953 19745 403cff 19743->19745 19746 40335f 12 API calls 19745->19746 19747 403d20 19746->19747 19748 403d30 19747->19748 19749 403316 7 API calls 19747->19749 19748->19680 19749->19748 19751 403c19 19750->19751 19752 403c1e 19750->19752 19753 406524 19 API calls 19751->19753 19754 40335f 12 API calls 19752->19754 19753->19752 19755 403c4b 19754->19755 19756 403316 7 API calls 19755->19756 19762 403c5f 19755->19762 19756->19762 19757 403ca2 19758 403411 7 API calls 19757->19758 19759 403cae 19758->19759 19759->19682 19760 40335f 12 API calls 19760->19762 19761 403316 7 API calls 19761->19762 19762->19757 19762->19760 19762->19761 19764 403bbd 19763->19764 19766 403bc2 19763->19766 19765 406524 19 API calls 19764->19765 19765->19766 19766->19685 19768 403344 19767->19768 19769 403349 19767->19769 19770 404594 7 API calls 19768->19770 19771 4045cd 7 API calls 19769->19771 19770->19769 19772 403352 ExitProcess 19771->19772 19977 40397d 19773->19977 19776 403a30 19803 4030b0 19780->19803 19783 404245 19784 40425f GetEnvironmentVariableA 19783->19784 19786 404257 19783->19786 19787 40427e 19784->19787 19791 40433c 19784->19791 19786->19697 19786->19698 19788 4042c3 GetModuleFileNameA 19787->19788 19789 4042bb 19787->19789 19788->19789 19789->19791 19805 406540 19789->19805 19791->19786 19808 4041ef GetModuleHandleA 19791->19808 19793 404757 19792->19793 19793->19702 19795 404fa0 HeapAlloc 19794->19795 19796 404f99 19794->19796 19797 404fbd VirtualAlloc 19795->19797 19802 404ff5 19795->19802 19796->19797 19798 4050b2 19797->19798 19799 404fdd VirtualAlloc 19797->19799 19800 4050ba HeapFree 19798->19800 19798->19802 19801 4050a4 VirtualFree 19799->19801 19799->19802 19800->19802 19801->19798 19802->19702 19804 4030bc GetVersionExA 19803->19804 19804->19783 19804->19784 19810 406557 19805->19810 19809 404206 19808->19809 19809->19786 19812 40656f 19810->19812 19814 40659f 19812->19814 19817 405716 19812->19817 19813 405716 6 API calls 19813->19814 19814->19813 19816 406553 19814->19816 19821 40771b 19814->19821 19816->19791 19818 405734 19817->19818 19820 405728 19817->19820 19827 406a7e 19818->19827 19820->19812 19822 407746 19821->19822 19826 407729 19821->19826 19823 407762 19822->19823 19824 405716 6 API calls 19822->19824 19823->19826 19839 406bc7 19823->19839 19824->19823 19826->19814 19828 406aaf GetStringTypeW 19827->19828 19834 406ac7 19827->19834 19829 406acb GetStringTypeA 19828->19829 19828->19834 19832 406bb3 19829->19832 19829->19834 19830 406af2 GetStringTypeA 19830->19832 19832->19820 19833 406b16 19833->19832 19835 406b2c MultiByteToWideChar 19833->19835 19834->19830 19834->19833 19835->19832 19836 406b50 19835->19836 19836->19832 19837 406b8a MultiByteToWideChar 19836->19837 19837->19832 19838 406ba3 GetStringTypeW 19837->19838 19838->19832 19840 406bf7 LCMapStringW 19839->19840 19841 406c13 19839->19841 19840->19841 19842 406c1b LCMapStringA 19840->19842 19843 406c79 19841->19843 19844 406c5c LCMapStringA 19841->19844 19842->19841 19851 406d55 19842->19851 19845 406c8f MultiByteToWideChar 19843->19845 19843->19851 19844->19851 19846 406cb9 19845->19846 19845->19851 19847 406cef MultiByteToWideChar 19846->19847 19846->19851 19848 406d08 LCMapStringW 19847->19848 19847->19851 19849 406d23 19848->19849 19848->19851 19850 406d29 19849->19850 19852 406d69 19849->19852 19850->19851 19853 406d37 LCMapStringW 19850->19853 19851->19826 19852->19851 19854 406da1 LCMapStringW 19852->19854 19853->19851 19854->19851 19855 406db9 WideCharToMultiByte 19854->19855 19855->19851 19866 403371 19857->19866 19860 403316 19861 403324 19860->19861 19862 40331f 19860->19862 19909 4045cd 19861->19909 19903 404594 19862->19903 19867 40336e 19866->19867 19869 403378 19866->19869 19867->19707 19867->19860 19869->19867 19870 40339d 19869->19870 19871 4033c1 19870->19871 19872 4033ac 19870->19872 19874 403400 HeapAlloc 19871->19874 19878 4033ba 19871->19878 19885 405284 19871->19885 19872->19878 19879 404ad7 19872->19879 19875 40340f 19874->19875 19875->19869 19876 4033bf 19876->19869 19878->19874 19878->19875 19878->19876 19882 404b09 19879->19882 19880 404ba8 19884 404bb7 19880->19884 19899 404e91 19880->19899 19882->19880 19882->19884 19892 404de0 19882->19892 19884->19878 19886 405292 19885->19886 19887 40537e VirtualAlloc 19886->19887 19888 405453 19886->19888 19891 40534f 19886->19891 19887->19891 19889 404f8c 5 API calls 19888->19889 19889->19891 19891->19878 19891->19891 19893 404e23 HeapAlloc 19892->19893 19894 404df3 HeapReAlloc 19892->19894 19896 404e73 19893->19896 19897 404e49 VirtualAlloc 19893->19897 19895 404e12 19894->19895 19894->19896 19895->19893 19896->19880 19897->19896 19898 404e63 HeapFree 19897->19898 19898->19896 19900 404ea3 19899->19900 19900->19900 19901 404ecd VirtualAlloc 19900->19901 19902 404eec 19901->19902 19902->19884 19904 40459e 19903->19904 19905 4045cb 19904->19905 19906 4045cd 7 API calls 19904->19906 19905->19861 19907 4045b5 19906->19907 19908 4045cd 7 API calls 19907->19908 19908->19905 19910 4045e0 19909->19910 19911 404620 19910->19911 19912 4046f7 19910->19912 19917 40332d 19910->19917 19913 40462c GetModuleFileNameA 19911->19913 19911->19917 19914 40470a GetStdHandle WriteFile 19912->19914 19915 404644 19913->19915 19914->19917 19918 4068e8 19915->19918 19917->19707 19919 4068f5 LoadLibraryA 19918->19919 19922 406937 19918->19922 19920 406906 GetProcAddress 19919->19920 19919->19922 19921 40691d GetProcAddress GetProcAddress 19920->19921 19920->19922 19921->19922 19922->19917 19924 403439 19923->19924 19925 40341d 19923->19925 19924->19737 19926 403427 19925->19926 19927 40343d 19925->19927 19929 403469 HeapFree 19926->19929 19930 403433 19926->19930 19928 403468 19927->19928 19932 403457 19927->19932 19928->19929 19929->19924 19934 4047ae 19930->19934 19940 40523f 19932->19940 19936 4047ec 19934->19936 19939 404aa2 19934->19939 19935 4049e8 VirtualFree 19937 404a4c 19935->19937 19936->19935 19936->19939 19938 404a5b VirtualFree HeapFree 19937->19938 19937->19939 19938->19939 19939->19924 19941 405282 19940->19941 19942 40526c 19940->19942 19941->19924 19942->19941 19944 405126 19942->19944 19947 405133 19944->19947 19945 4051e3 19945->19941 19946 405154 VirtualFree 19946->19947 19947->19945 19947->19946 19949 4050d0 VirtualFree 19947->19949 19950 4050ed 19949->19950 19951 40511d 19950->19951 19952 4050fd HeapFree 19950->19952 19951->19947 19952->19947 19954 40652d 19953->19954 19955 406534 19953->19955 19957 406160 19954->19957 19955->19743 19964 4062f9 19957->19964 19959 4062ed 19959->19955 19962 4061a3 GetCPInfo 19963 4061b7 19962->19963 19963->19959 19969 40639f GetCPInfo 19963->19969 19965 406319 19964->19965 19966 406309 GetOEMCP 19964->19966 19967 406171 19965->19967 19968 40631e GetACP 19965->19968 19966->19965 19967->19959 19967->19962 19967->19963 19968->19967 19970 40648a 19969->19970 19973 4063c2 19969->19973 19970->19959 19971 406a7e 6 API calls 19972 40643e 19971->19972 19974 406bc7 9 API calls 19972->19974 19973->19971 19975 406462 19974->19975 19976 406bc7 9 API calls 19975->19976 19976->19970 19978 403989 GetCurrentProcess TerminateProcess 19977->19978 19979 40399a 19977->19979 19978->19979 19980 4032f7 19979->19980 19981 403a04 ExitProcess 19979->19981 19980->19776 19982 4027e1 19983 40dcde VirtualAlloc 19982->19983 19984 2caf8ae CreateFileA 19985 2caf9aa 19984->19985 19987 2caf8df 19984->19987 19986 2caf8f7 DeviceIoControl 19986->19987 19987->19986 19988 2caf9a0 CloseHandle 19987->19988 19989 2caf96c GetLastError 19987->19989 19991 2cb3b5c 19987->19991 19988->19985 19989->19987 19989->19988 19995 2cb3b64 19991->19995 19992 2cb2fbc _malloc 59 API calls 19992->19995 19993 2cb3b7e 19993->19987 19994 2cb8213 __calloc_impl RtlDecodePointer 19994->19995 19995->19992 19995->19993 19995->19994 19996 2cb3b82 std::exception::exception 19995->19996 19999 2cb456a 19996->19999 19998 2cb3bac 20001 2cb4589 RaiseException 19999->20001 20001->19998 20002 40d06a 20003 40d065 20002->20003 20003->20002 20004 40d104 20003->20004 20005 40d0ca Sleep 20003->20005 20005->20004 20006 40dd6a 20007 40d5e7 OpenSCManagerA 20006->20007 20009 4029ed LoadLibraryExA 20010 40d605 20009->20010 20011 402b30 20014 401f27 20011->20014 20015 401f3c 20014->20015 20018 401a1d 20015->20018 20017 401f45 20019 401a2c 20018->20019 20024 401a4f CreateFileA 20019->20024 20023 401a3e 20023->20017 20025 401a35 20024->20025 20027 401a7d 20024->20027 20032 401b4b LoadLibraryA 20025->20032 20026 401a98 DeviceIoControl 20026->20027 20027->20026 20029 401b3a CloseHandle 20027->20029 20030 401b0e GetLastError 20027->20030 20041 403016 20027->20041 20044 403008 20027->20044 20029->20025 20030->20027 20030->20029 20033 401c21 20032->20033 20034 401b6e GetProcAddress 20032->20034 20033->20023 20035 401c18 FreeLibrary 20034->20035 20038 401b85 20034->20038 20035->20033 20036 401b95 GetAdaptersInfo 20036->20038 20037 403016 7 API calls 20037->20038 20038->20036 20038->20037 20039 401c15 20038->20039 20040 403008 12 API calls 20038->20040 20039->20035 20040->20038 20042 403411 7 API calls 20041->20042 20043 40301f 20042->20043 20043->20027 20045 403371 12 API calls 20044->20045 20046 403013 20045->20046 20046->20027 20047 2ce5c7e 20048 2d2e1e6 CreateFileA 20047->20048 20049 402bb3 20050 40d0e9 20049->20050 20052 401f64 FindResourceA 20050->20052 20053 401f86 GetLastError SizeofResource 20052->20053 20058 401f9f 20052->20058 20054 401fa6 LoadResource LockResource GlobalAlloc 20053->20054 20053->20058 20055 401fd2 20054->20055 20056 401ffb GetTickCount 20055->20056 20059 402005 GlobalAlloc 20056->20059 20058->20050 20059->20058 20060 4021f4 20061 4028c3 RegSetValueExA 20060->20061 20063 4029b4 20064 40d005 20063->20064 20065 40d0ca Sleep 20064->20065 20066 40d2ae 20064->20066 20067 40d104 20065->20067 20068 2caf9b2 LoadLibraryA 20069 2caf9db GetProcAddress 20068->20069 20070 2cafa95 20068->20070 20071 2cafa8e FreeLibrary 20069->20071 20074 2caf9ef 20069->20074 20071->20070 20072 2cafa01 GetAdaptersInfo 20072->20074 20073 2cafa89 20073->20071 20074->20072 20074->20073 20074->20074 20075 2cb3b5c _Allocate 60 API calls 20074->20075 20075->20074 20078 2ca7bb1 20079 2ca7bb8 20078->20079 20112 2ca66f4 _memset 20078->20112 20081 2ca670e RtlEnterCriticalSection RtlLeaveCriticalSection 20081->20112 20082 2ca6708 Sleep 20082->20081 20083 2ca72ab InternetOpenA 20084 2ca72c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 20083->20084 20083->20112 20088 2ca7342 _memset 20084->20088 20085 2ca7322 InternetOpenUrlA 20086 2ca7382 InternetCloseHandle 20085->20086 20085->20088 20086->20112 20087 2ca7346 InternetReadFile 20087->20088 20089 2ca7377 InternetCloseHandle 20087->20089 20088->20085 20088->20087 20089->20086 20090 2ca73e9 RtlEnterCriticalSection RtlLeaveCriticalSection 20123 2cb234c 20090->20123 20092 2cb2fbc _malloc 59 API calls 20093 2ca749d RtlEnterCriticalSection RtlLeaveCriticalSection 20092->20093 20093->20112 20094 2cb234c 66 API calls 20094->20112 20095 2ca776a RtlEnterCriticalSection RtlLeaveCriticalSection 20095->20112 20097 2cb2fbc 59 API calls _malloc 20097->20112 20100 2ca78e2 RtlEnterCriticalSection 20101 2ca790f RtlLeaveCriticalSection 20100->20101 20100->20112 20201 2ca3c67 20101->20201 20105 2cb35f6 60 API calls _strtok 20105->20112 20106 2caa730 73 API calls 20106->20112 20107 2cb2f84 59 API calls _free 20107->20112 20109 2cb3b5c _Allocate 60 API calls 20109->20112 20112->20081 20112->20082 20112->20083 20112->20090 20112->20092 20112->20094 20112->20095 20112->20097 20112->20100 20112->20101 20112->20105 20112->20106 20112->20107 20112->20109 20119 2ca76ec Sleep 20112->20119 20121 2ca76e7 shared_ptr 20112->20121 20133 2caa85a 20112->20133 20137 2ca5119 20112->20137 20166 2caac1a 20112->20166 20176 2ca61f5 20112->20176 20181 2cb2428 20112->20181 20192 2ca1ba7 20112->20192 20208 2ca3d7e 20112->20208 20215 2ca8346 20112->20215 20221 2cad122 20112->20221 20226 2ca83f5 20112->20226 20234 2ca33b2 20112->20234 20241 2cb2860 20112->20241 20244 2ca9742 20112->20244 20259 2ca900e 20112->20259 20266 2ca534d 20112->20266 20251 2cb1900 20119->20251 20121->20112 20121->20119 20255 2ca4100 20121->20255 20124 2cb2358 20123->20124 20125 2cb237b 20123->20125 20124->20125 20127 2cb235e 20124->20127 20276 2cb2393 20125->20276 20129 2cb5e6b __cftof2_l 59 API calls 20127->20129 20128 2cb238e 20128->20112 20130 2cb2363 20129->20130 20131 2cb4f05 __cftof2_l 9 API calls 20130->20131 20132 2cb236e 20131->20132 20132->20112 20134 2caa864 __EH_prolog 20133->20134 20584 2cae00b 20134->20584 20136 2caa882 shared_ptr 20136->20112 20138 2ca5123 __EH_prolog 20137->20138 20588 2cb0b20 20138->20588 20141 2ca3c67 72 API calls 20142 2ca514a 20141->20142 20143 2ca3d7e 64 API calls 20142->20143 20144 2ca5158 20143->20144 20145 2ca8346 89 API calls 20144->20145 20146 2ca516c 20145->20146 20149 2ca5322 shared_ptr 20146->20149 20592 2caa730 20146->20592 20149->20112 20150 2ca51f6 20153 2caa730 73 API calls 20150->20153 20151 2ca51c4 20152 2caa730 73 API calls 20151->20152 20154 2ca51d4 20152->20154 20155 2ca5207 20153->20155 20154->20149 20158 2caa730 73 API calls 20154->20158 20155->20149 20156 2caa730 73 API calls 20155->20156 20157 2ca524a 20156->20157 20157->20149 20160 2caa730 73 API calls 20157->20160 20159 2ca52b4 20158->20159 20159->20149 20161 2caa730 73 API calls 20159->20161 20160->20154 20162 2ca52da 20161->20162 20162->20149 20163 2caa730 73 API calls 20162->20163 20164 2ca5304 20163->20164 20597 2cacee4 20164->20597 20167 2caac24 __EH_prolog 20166->20167 20648 2cad0f9 20167->20648 20169 2caac45 shared_ptr 20651 2cb2100 20169->20651 20171 2caac5c 20172 2caac72 20171->20172 20657 2ca3fb0 20171->20657 20172->20112 20177 2ca61f7 20176->20177 20178 2cb2fbc _malloc 59 API calls 20176->20178 20179 2ca624e 20177->20179 20180 2cb2fbc _malloc 59 API calls 20177->20180 20178->20177 20180->20177 20182 2cb2459 20181->20182 20183 2cb2444 20181->20183 20182->20183 20185 2cb2460 20182->20185 20184 2cb5e6b __cftof2_l 59 API calls 20183->20184 20186 2cb2449 20184->20186 21147 2cb6060 20185->21147 20188 2cb4f05 __cftof2_l 9 API calls 20186->20188 20190 2cb2454 20188->20190 20190->20112 21372 2cc5400 20192->21372 20194 2ca1bb1 RtlEnterCriticalSection 20195 2ca1be9 RtlLeaveCriticalSection 20194->20195 20197 2ca1bd1 20194->20197 21373 2cae33b 20195->21373 20197->20195 20198 2ca1c55 RtlLeaveCriticalSection 20197->20198 20198->20112 20199 2ca1c22 20199->20198 20202 2cb0b20 Mailbox 68 API calls 20201->20202 20203 2ca3c7e 20202->20203 21455 2ca3ca2 20203->21455 20209 2ca3dcb htons 20208->20209 20210 2ca3d99 htons 20208->20210 21488 2ca3c16 20209->21488 21482 2ca3bd3 20210->21482 20214 2ca3ded 20214->20112 20216 2ca837f 20215->20216 20217 2ca835e 20215->20217 20220 2ca83a4 20216->20220 21522 2ca2ac7 20216->21522 21519 2ca9608 20217->21519 20220->20112 20222 2cb0b20 Mailbox 68 API calls 20221->20222 20224 2cad138 20222->20224 20223 2cad226 20223->20112 20224->20223 20225 2ca2db5 73 API calls 20224->20225 20225->20224 20227 2ca8410 WSASetLastError shutdown 20226->20227 20228 2ca8400 20226->20228 20230 2caa514 69 API calls 20227->20230 20229 2cb0b20 Mailbox 68 API calls 20228->20229 20231 2ca8405 20229->20231 20232 2ca842d 20230->20232 20231->20112 20232->20231 20233 2cb0b20 Mailbox 68 API calls 20232->20233 20233->20231 20235 2ca33e1 20234->20235 20236 2ca33c4 InterlockedCompareExchange 20234->20236 20237 2ca29ee 76 API calls 20235->20237 20236->20235 20238 2ca33d6 20236->20238 20239 2ca33f1 20237->20239 21616 2ca32ab 20238->21616 20239->20112 21669 2cb287e 20241->21669 20243 2cb2879 20243->20112 20245 2ca974c __EH_prolog 20244->20245 20246 2ca1ba7 210 API calls 20245->20246 20247 2ca97a1 20246->20247 20248 2ca97be RtlEnterCriticalSection 20247->20248 20249 2ca97d9 20248->20249 20250 2ca97dc RtlLeaveCriticalSection 20248->20250 20249->20250 20250->20112 20252 2cb1931 20251->20252 20253 2cb190d 20251->20253 20252->20121 20253->20252 20254 2cb1921 GetProcessHeap HeapFree 20253->20254 20254->20252 20256 2ca4118 20255->20256 20257 2ca4112 20255->20257 20256->20121 21675 2caa70e 20257->21675 20260 2ca9018 __EH_prolog 20259->20260 21677 2ca373f 20260->21677 20262 2ca9032 RtlEnterCriticalSection 20263 2ca9041 RtlLeaveCriticalSection 20262->20263 20265 2ca907b 20263->20265 20265->20112 20267 2cb2fbc _malloc 59 API calls 20266->20267 20268 2ca5362 SHGetSpecialFolderPathA 20267->20268 20269 2ca5378 20268->20269 21686 2cb3781 20269->21686 20272 2ca53e2 20272->20112 20274 2ca53dc 21702 2cb3a94 20274->21702 20286 2cb228b 20276->20286 20279 2cb23b5 20281 2cb5e6b __cftof2_l 59 API calls 20279->20281 20280 2cb23cc 20283 2cb23c5 ___ascii_stricmp 20280->20283 20285 2cb598a 66 API calls __tolower_l 20280->20285 20282 2cb23ba 20281->20282 20284 2cb4f05 __cftof2_l 9 API calls 20282->20284 20283->20128 20284->20283 20285->20280 20287 2cb229c 20286->20287 20293 2cb22e9 20286->20293 20294 2cb5c6a 20287->20294 20290 2cb22c9 20290->20293 20314 2cb5551 20290->20314 20293->20279 20293->20280 20295 2cb5c82 __getptd_noexit 59 API calls 20294->20295 20296 2cb5c70 20295->20296 20297 2cb22a2 20296->20297 20298 2cb844f __amsg_exit 59 API calls 20296->20298 20297->20290 20299 2cb51cf 20297->20299 20298->20297 20300 2cb51db __fsopen 20299->20300 20301 2cb5c6a CallCatchBlock 59 API calls 20300->20301 20302 2cb51e4 20301->20302 20303 2cb5213 20302->20303 20305 2cb51f7 20302->20305 20304 2cb88fd __lock 59 API calls 20303->20304 20306 2cb521a 20304->20306 20307 2cb5c6a CallCatchBlock 59 API calls 20305->20307 20326 2cb524f 20306->20326 20309 2cb51fc 20307->20309 20312 2cb520a __fsopen 20309->20312 20313 2cb844f __amsg_exit 59 API calls 20309->20313 20312->20290 20313->20312 20315 2cb555d __fsopen 20314->20315 20316 2cb5c6a CallCatchBlock 59 API calls 20315->20316 20317 2cb5567 20316->20317 20318 2cb88fd __lock 59 API calls 20317->20318 20323 2cb5579 20317->20323 20319 2cb5597 20318->20319 20324 2cb2f84 _free 59 API calls 20319->20324 20325 2cb55c4 20319->20325 20321 2cb844f __amsg_exit 59 API calls 20322 2cb5587 __fsopen 20321->20322 20322->20293 20323->20321 20323->20322 20324->20325 20580 2cb55ee 20325->20580 20327 2cb525a ___addlocaleref ___removelocaleref 20326->20327 20328 2cb522e 20326->20328 20327->20328 20333 2cb4fd5 20327->20333 20330 2cb5246 20328->20330 20579 2cb8a67 RtlLeaveCriticalSection 20330->20579 20332 2cb524d 20332->20309 20334 2cb504e 20333->20334 20339 2cb4fea 20333->20339 20335 2cb509b 20334->20335 20336 2cb2f84 _free 59 API calls 20334->20336 20358 2cb50c4 20335->20358 20403 2cbd54d 20335->20403 20338 2cb506f 20336->20338 20343 2cb2f84 _free 59 API calls 20338->20343 20339->20334 20342 2cb501b 20339->20342 20345 2cb2f84 _free 59 API calls 20339->20345 20341 2cb5039 20344 2cb2f84 _free 59 API calls 20341->20344 20342->20341 20352 2cb2f84 _free 59 API calls 20342->20352 20348 2cb5082 20343->20348 20349 2cb5043 20344->20349 20350 2cb5010 20345->20350 20346 2cb2f84 _free 59 API calls 20346->20358 20347 2cb5123 20351 2cb2f84 _free 59 API calls 20347->20351 20353 2cb2f84 _free 59 API calls 20348->20353 20354 2cb2f84 _free 59 API calls 20349->20354 20363 2cbd3ea 20350->20363 20356 2cb5129 20351->20356 20357 2cb502e 20352->20357 20359 2cb5090 20353->20359 20354->20334 20356->20328 20391 2cbd4e6 20357->20391 20358->20347 20361 2cb2f84 59 API calls _free 20358->20361 20362 2cb2f84 _free 59 API calls 20359->20362 20361->20358 20362->20335 20364 2cbd3f9 20363->20364 20365 2cbd4e2 20363->20365 20366 2cbd40a 20364->20366 20368 2cb2f84 _free 59 API calls 20364->20368 20365->20342 20367 2cbd41c 20366->20367 20369 2cb2f84 _free 59 API calls 20366->20369 20370 2cbd42e 20367->20370 20371 2cb2f84 _free 59 API calls 20367->20371 20368->20366 20369->20367 20372 2cbd440 20370->20372 20373 2cb2f84 _free 59 API calls 20370->20373 20371->20370 20374 2cbd452 20372->20374 20376 2cb2f84 _free 59 API calls 20372->20376 20373->20372 20375 2cbd464 20374->20375 20377 2cb2f84 _free 59 API calls 20374->20377 20378 2cbd476 20375->20378 20379 2cb2f84 _free 59 API calls 20375->20379 20376->20374 20377->20375 20380 2cbd488 20378->20380 20381 2cb2f84 _free 59 API calls 20378->20381 20379->20378 20382 2cbd49a 20380->20382 20384 2cb2f84 _free 59 API calls 20380->20384 20381->20380 20383 2cbd4ac 20382->20383 20385 2cb2f84 _free 59 API calls 20382->20385 20386 2cbd4be 20383->20386 20387 2cb2f84 _free 59 API calls 20383->20387 20384->20382 20385->20383 20388 2cbd4d0 20386->20388 20389 2cb2f84 _free 59 API calls 20386->20389 20387->20386 20388->20365 20390 2cb2f84 _free 59 API calls 20388->20390 20389->20388 20390->20365 20392 2cbd4f1 20391->20392 20402 2cbd549 20391->20402 20393 2cbd501 20392->20393 20394 2cb2f84 _free 59 API calls 20392->20394 20395 2cbd513 20393->20395 20396 2cb2f84 _free 59 API calls 20393->20396 20394->20393 20397 2cbd525 20395->20397 20398 2cb2f84 _free 59 API calls 20395->20398 20396->20395 20399 2cb2f84 _free 59 API calls 20397->20399 20400 2cbd537 20397->20400 20398->20397 20399->20400 20401 2cb2f84 _free 59 API calls 20400->20401 20400->20402 20401->20402 20402->20341 20404 2cbd55c 20403->20404 20578 2cb50b9 20403->20578 20405 2cb2f84 _free 59 API calls 20404->20405 20406 2cbd564 20405->20406 20407 2cb2f84 _free 59 API calls 20406->20407 20408 2cbd56c 20407->20408 20409 2cb2f84 _free 59 API calls 20408->20409 20410 2cbd574 20409->20410 20411 2cb2f84 _free 59 API calls 20410->20411 20412 2cbd57c 20411->20412 20413 2cb2f84 _free 59 API calls 20412->20413 20414 2cbd584 20413->20414 20415 2cb2f84 _free 59 API calls 20414->20415 20416 2cbd58c 20415->20416 20417 2cb2f84 _free 59 API calls 20416->20417 20418 2cbd593 20417->20418 20419 2cb2f84 _free 59 API calls 20418->20419 20420 2cbd59b 20419->20420 20421 2cb2f84 _free 59 API calls 20420->20421 20422 2cbd5a3 20421->20422 20578->20346 20579->20332 20583 2cb8a67 RtlLeaveCriticalSection 20580->20583 20582 2cb55f5 20582->20323 20583->20582 20585 2cae015 __EH_prolog 20584->20585 20586 2cb3b5c _Allocate 60 API calls 20585->20586 20587 2cae02c 20586->20587 20587->20136 20589 2cb0b49 20588->20589 20590 2ca513d 20588->20590 20591 2cb33b4 __cinit 68 API calls 20589->20591 20590->20141 20591->20590 20593 2cb0b20 Mailbox 68 API calls 20592->20593 20596 2caa74a 20593->20596 20594 2ca519d 20594->20149 20594->20150 20594->20151 20596->20594 20602 2ca2db5 20596->20602 20598 2cb0b20 Mailbox 68 API calls 20597->20598 20599 2cacefe 20598->20599 20600 2cad00d 20599->20600 20629 2ca2b95 20599->20629 20600->20149 20603 2ca2dca 20602->20603 20604 2ca2de4 20602->20604 20605 2cb0b20 Mailbox 68 API calls 20603->20605 20606 2ca2dfc 20604->20606 20608 2ca2def 20604->20608 20610 2ca2dcf 20605->20610 20616 2ca2d39 WSASetLastError WSASend 20606->20616 20609 2cb0b20 Mailbox 68 API calls 20608->20609 20609->20610 20610->20596 20611 2cb0b20 68 API calls Mailbox 20614 2ca2e0c 20611->20614 20612 2ca2e54 WSASetLastError select 20626 2caa514 20612->20626 20614->20610 20614->20611 20614->20612 20615 2ca2d39 71 API calls 20614->20615 20615->20614 20617 2caa514 69 API calls 20616->20617 20618 2ca2d6e 20617->20618 20619 2ca2d82 20618->20619 20620 2ca2d75 20618->20620 20622 2cb0b20 Mailbox 68 API calls 20619->20622 20623 2ca2d7a 20619->20623 20621 2cb0b20 Mailbox 68 API calls 20620->20621 20621->20623 20622->20623 20624 2ca2d9c 20623->20624 20625 2cb0b20 Mailbox 68 API calls 20623->20625 20624->20614 20625->20624 20627 2cb0b20 Mailbox 68 API calls 20626->20627 20628 2caa520 WSAGetLastError 20627->20628 20628->20614 20630 2ca2bb1 20629->20630 20631 2ca2bc7 20629->20631 20632 2cb0b20 Mailbox 68 API calls 20630->20632 20633 2ca2bd2 20631->20633 20643 2ca2bdf 20631->20643 20637 2ca2bb6 20632->20637 20635 2cb0b20 Mailbox 68 API calls 20633->20635 20634 2ca2be2 WSASetLastError WSARecv 20636 2caa514 69 API calls 20634->20636 20635->20637 20636->20643 20637->20599 20638 2ca2d22 20644 2ca1996 20638->20644 20639 2cb0b20 68 API calls Mailbox 20639->20643 20641 2ca2cbc WSASetLastError select 20642 2caa514 69 API calls 20641->20642 20642->20643 20643->20634 20643->20637 20643->20638 20643->20639 20643->20641 20645 2ca199f 20644->20645 20646 2ca19bb 20644->20646 20647 2cb33b4 __cinit 68 API calls 20645->20647 20646->20637 20647->20646 20670 2cae28b 20648->20670 20650 2cad10b 20650->20169 20751 2cb33c9 20651->20751 20654 2cb2124 20654->20171 20655 2cb214d ResumeThread 20655->20171 20656 2cb2146 CloseHandle 20656->20655 20658 2cb0b20 Mailbox 68 API calls 20657->20658 20659 2ca3fb8 20658->20659 21118 2ca1815 20659->21118 20662 2caa696 20663 2caa6a0 __EH_prolog 20662->20663 21124 2cacc4e 20663->21124 20671 2cae295 __EH_prolog 20670->20671 20676 2ca4030 20671->20676 20675 2cae2c3 20675->20650 20688 2cc5400 20676->20688 20678 2ca403a GetProcessHeap RtlAllocateHeap 20679 2ca407c 20678->20679 20680 2ca4053 std::exception::exception 20678->20680 20679->20675 20682 2ca408a 20679->20682 20689 2caa6d5 20680->20689 20683 2ca4094 __EH_prolog 20682->20683 20733 2caa2f4 20683->20733 20688->20678 20690 2caa6df __EH_prolog 20689->20690 20697 2cacc84 20690->20697 20695 2cb456a __CxxThrowException@8 RaiseException 20696 2caa70d 20695->20696 20703 2cad7e4 20697->20703 20700 2cacc9e 20725 2cad81c 20700->20725 20702 2caa6fc 20702->20695 20706 2cb2523 20703->20706 20709 2cb2551 20706->20709 20710 2cb255f 20709->20710 20714 2caa6ee 20709->20714 20715 2cb25e7 20710->20715 20714->20700 20716 2cb25f0 20715->20716 20718 2cb2564 20715->20718 20717 2cb2f84 _free 59 API calls 20716->20717 20717->20718 20718->20714 20719 2cb25a9 20718->20719 20720 2cb25b5 _strlen 20719->20720 20723 2cb25da 20719->20723 20721 2cb2fbc _malloc 59 API calls 20720->20721 20722 2cb25c7 20721->20722 20722->20723 20724 2cb6ccc __setenvp 59 API calls 20722->20724 20723->20714 20724->20723 20726 2cad826 __EH_prolog 20725->20726 20729 2cab747 20726->20729 20728 2cad85d Mailbox 20728->20702 20730 2cab751 __EH_prolog 20729->20730 20731 2cb2523 std::exception::exception 59 API calls 20730->20731 20732 2cab762 Mailbox 20731->20732 20732->20728 20744 2cab10b 20733->20744 20735 2ca40c1 20736 2ca3fdc 20735->20736 20750 2cc5400 20736->20750 20738 2ca3fe6 CreateEventA 20739 2ca400f 20738->20739 20740 2ca3ffd 20738->20740 20739->20675 20741 2ca3fb0 Mailbox 68 API calls 20740->20741 20742 2ca4005 20741->20742 20743 2caa696 Mailbox 60 API calls 20742->20743 20743->20739 20745 2cab117 20744->20745 20747 2cab127 std::exception::exception 20744->20747 20746 2cb3b5c _Allocate 60 API calls 20745->20746 20745->20747 20746->20747 20747->20735 20748 2cb456a __CxxThrowException@8 RaiseException 20747->20748 20749 2cafb3c 20748->20749 20750->20738 20752 2cb33eb 20751->20752 20753 2cb33d7 20751->20753 20755 2cb8a7c __calloc_crt 59 API calls 20752->20755 20754 2cb5e6b __cftof2_l 59 API calls 20753->20754 20756 2cb33dc 20754->20756 20757 2cb33f8 20755->20757 20758 2cb4f05 __cftof2_l 9 API calls 20756->20758 20759 2cb3449 20757->20759 20762 2cb5c6a CallCatchBlock 59 API calls 20757->20762 20761 2cb211b 20758->20761 20760 2cb2f84 _free 59 API calls 20759->20760 20764 2cb344f 20760->20764 20761->20654 20761->20655 20761->20656 20763 2cb3405 20762->20763 20765 2cb5cf1 __initptd 59 API calls 20763->20765 20764->20761 20770 2cb5e4a 20764->20770 20767 2cb340e CreateThread 20765->20767 20767->20761 20769 2cb3441 GetLastError 20767->20769 20778 2cb3529 20767->20778 20769->20759 20775 2cb5e37 20770->20775 20772 2cb5e53 __dosmaperr 20773 2cb5e6b __cftof2_l 59 API calls 20772->20773 20774 2cb5e66 20773->20774 20774->20761 20776 2cb5c82 __getptd_noexit 59 API calls 20775->20776 20777 2cb5e3c 20776->20777 20777->20772 20779 2cb3532 __threadstartex@4 20778->20779 20780 2cb91db __CRT_INIT@12 TlsGetValue 20779->20780 20781 2cb3538 20780->20781 20782 2cb356b 20781->20782 20783 2cb353f __threadstartex@4 20781->20783 20810 2cb5aff 20782->20810 20785 2cb91fa __CRT_INIT@12 TlsSetValue 20783->20785 20786 2cb354e 20785->20786 20787 2cb3561 GetCurrentThreadId 20786->20787 20788 2cb3554 GetLastError RtlExitUserThread 20786->20788 20790 2cb3586 ___crtIsPackagedApp 20787->20790 20788->20787 20789 2cb359a 20800 2cb3462 20789->20800 20790->20789 20794 2cb34d1 20790->20794 20795 2cb34da LoadLibraryExW GetProcAddress 20794->20795 20796 2cb3513 RtlDecodePointer 20794->20796 20797 2cb34fd RtlEncodePointer 20795->20797 20798 2cb34fc 20795->20798 20799 2cb3523 20796->20799 20797->20796 20798->20789 20799->20789 20801 2cb346e __fsopen 20800->20801 20802 2cb5c6a CallCatchBlock 59 API calls 20801->20802 20803 2cb3473 20802->20803 20842 2cb2170 20803->20842 20811 2cb5b0b __fsopen 20810->20811 20812 2cb5b24 20811->20812 20813 2cb5c13 __fsopen 20811->20813 20814 2cb2f84 _free 59 API calls 20811->20814 20815 2cb5b33 20812->20815 20816 2cb2f84 _free 59 API calls 20812->20816 20813->20790 20814->20812 20817 2cb2f84 _free 59 API calls 20815->20817 20819 2cb5b42 20815->20819 20816->20815 20817->20819 20818 2cb2f84 _free 59 API calls 20820 2cb5b51 20818->20820 20819->20818 20819->20820 20821 2cb2f84 _free 59 API calls 20820->20821 20823 2cb5b60 20820->20823 20821->20823 20822 2cb5b6f 20825 2cb5b7e 20822->20825 20827 2cb2f84 _free 59 API calls 20822->20827 20823->20822 20824 2cb2f84 _free 59 API calls 20823->20824 20824->20822 20826 2cb5b90 20825->20826 20828 2cb2f84 _free 59 API calls 20825->20828 20829 2cb88fd __lock 59 API calls 20826->20829 20827->20825 20828->20826 20832 2cb5b98 20829->20832 20830 2cb5bbb 21110 2cb5c1f 20830->21110 20832->20830 20834 2cb2f84 _free 59 API calls 20832->20834 20834->20830 20860 2cb1620 20842->20860 20874 2cb1684 20860->20874 20861 2cb1700 20863 2cb1716 20861->20863 20865 2cb1713 CloseHandle 20861->20865 20862 2cb169c 20864 2cb16de ResetEvent 20862->20864 20868 2cb16b5 OpenEventA 20862->20868 20898 2cb1c20 20862->20898 20866 2cb455b __NMSG_WRITE 6 API calls 20863->20866 20870 2cb16e5 20864->20870 20865->20863 20869 2cb172e 20866->20869 20867 2cb17ac WaitForSingleObject 20867->20874 20872 2cb16cf 20868->20872 20873 2cb16d7 20868->20873 20902 2cb1860 20870->20902 20872->20873 20876 2cb16d4 CloseHandle 20872->20876 20873->20864 20873->20870 20874->20861 20874->20862 20874->20867 20877 2cb1780 CreateEventA 20874->20877 20878 2cb1c20 GetCurrentProcessId 20874->20878 20880 2cb179e CloseHandle 20874->20880 20876->20873 20877->20874 20878->20874 20880->20874 20912 2cb0c80 20898->20912 20900 2cb1c72 GetCurrentProcessId 20912->20900 21116 2cb8a67 RtlLeaveCriticalSection 21110->21116 21121 2cb24e3 21118->21121 21122 2cb25a9 std::exception::_Copy_str 59 API calls 21121->21122 21123 2ca182a 21122->21123 21123->20662 21130 2cad715 21124->21130 21127 2cacc68 21139 2cad74d 21127->21139 21133 2cab239 21130->21133 21134 2cab243 __EH_prolog 21133->21134 21135 2cb2523 std::exception::exception 59 API calls 21134->21135 21136 2cab254 21135->21136 21137 2ca7d09 std::bad_exception::bad_exception 60 API calls 21136->21137 21138 2caa6b5 21137->21138 21138->21127 21140 2cad757 __EH_prolog 21139->21140 21148 2cb228b _LocaleUpdate::_LocaleUpdate 59 API calls 21147->21148 21149 2cb60d5 21148->21149 21150 2cb5e6b __cftof2_l 59 API calls 21149->21150 21151 2cb60da 21150->21151 21152 2cb6bab 21151->21152 21163 2cb60fa __output_l __aulldvrm _strlen 21151->21163 21192 2cb9e41 21151->21192 21153 2cb5e6b __cftof2_l 59 API calls 21152->21153 21154 2cb6bb0 21153->21154 21157 2cb4f05 __cftof2_l 9 API calls 21154->21157 21156 2cb6b85 21158 2cb455b __NMSG_WRITE 6 API calls 21156->21158 21157->21156 21159 2cb2486 21158->21159 21159->20190 21171 2cb5f11 21159->21171 21161 2cb6be0 79 API calls _write_string 21161->21163 21162 2cb6763 RtlDecodePointer 21162->21163 21163->21152 21163->21156 21163->21161 21163->21162 21164 2cb2f84 _free 59 API calls 21163->21164 21165 2cb8ac4 __malloc_crt 59 API calls 21163->21165 21166 2cb67c6 RtlDecodePointer 21163->21166 21167 2cb6c28 79 API calls _write_multi_char 21163->21167 21168 2cb67eb RtlDecodePointer 21163->21168 21169 2cbfaf4 61 API calls __cftof 21163->21169 21170 2cb6c54 79 API calls _write_string 21163->21170 21199 2cbdd1e 21163->21199 21164->21163 21165->21163 21166->21163 21167->21163 21168->21163 21169->21163 21170->21163 21172 2cb9e41 __fflush_nolock 59 API calls 21171->21172 21173 2cb5f1f 21172->21173 21174 2cb5f2a 21173->21174 21175 2cb5f41 21173->21175 21176 2cb5e6b __cftof2_l 59 API calls 21174->21176 21177 2cb5f46 21175->21177 21186 2cb5f53 __flsbuf 21175->21186 21179 2cb5f2f 21176->21179 21178 2cb5e6b __cftof2_l 59 API calls 21177->21178 21178->21179 21179->20190 21180 2cb6031 21182 2cb9e65 __write 79 API calls 21180->21182 21181 2cb5fb7 21183 2cb5fd1 21181->21183 21185 2cb5fe8 21181->21185 21182->21179 21214 2cb9e65 21183->21214 21185->21179 21242 2cbf806 21185->21242 21186->21179 21188 2cb5fa2 21186->21188 21191 2cb5fad 21186->21191 21202 2cbf7b2 21186->21202 21188->21191 21211 2cbf975 21188->21211 21191->21180 21191->21181 21193 2cb9e4b 21192->21193 21194 2cb9e60 21192->21194 21195 2cb5e6b __cftof2_l 59 API calls 21193->21195 21194->21163 21196 2cb9e50 21195->21196 21197 2cb4f05 __cftof2_l 9 API calls 21196->21197 21198 2cb9e5b 21197->21198 21198->21163 21200 2cb228b _LocaleUpdate::_LocaleUpdate 59 API calls 21199->21200 21201 2cbdd2f 21200->21201 21201->21163 21203 2cbf7ca 21202->21203 21204 2cbf7bd 21202->21204 21207 2cbf7d6 21203->21207 21208 2cb5e6b __cftof2_l 59 API calls 21203->21208 21205 2cb5e6b __cftof2_l 59 API calls 21204->21205 21206 2cbf7c2 21205->21206 21206->21188 21207->21188 21209 2cbf7f7 21208->21209 21210 2cb4f05 __cftof2_l 9 API calls 21209->21210 21210->21206 21212 2cb8ac4 __malloc_crt 59 API calls 21211->21212 21213 2cbf98a 21212->21213 21213->21191 21215 2cb9e71 __fsopen 21214->21215 21216 2cb9e7e 21215->21216 21217 2cb9e95 21215->21217 21218 2cb5e37 __commit 59 API calls 21216->21218 21219 2cb9f34 21217->21219 21221 2cb9ea9 21217->21221 21220 2cb9e83 21218->21220 21222 2cb5e37 __commit 59 API calls 21219->21222 21223 2cb5e6b __cftof2_l 59 API calls 21220->21223 21224 2cb9ed1 21221->21224 21225 2cb9ec7 21221->21225 21226 2cb9ecc 21222->21226 21234 2cb9e8a __fsopen 21223->21234 21267 2cc0c97 21224->21267 21227 2cb5e37 __commit 59 API calls 21225->21227 21230 2cb5e6b __cftof2_l 59 API calls 21226->21230 21227->21226 21229 2cb9ed7 21231 2cb9eea 21229->21231 21232 2cb9efd 21229->21232 21233 2cb9f40 21230->21233 21276 2cb9f54 21231->21276 21235 2cb5e6b __cftof2_l 59 API calls 21232->21235 21237 2cb4f05 __cftof2_l 9 API calls 21233->21237 21234->21179 21238 2cb9f02 21235->21238 21237->21234 21240 2cb5e37 __commit 59 API calls 21238->21240 21239 2cb9ef6 21335 2cb9f2c 21239->21335 21240->21239 21243 2cbf812 __fsopen 21242->21243 21244 2cbf823 21243->21244 21245 2cbf83b 21243->21245 21247 2cb5e37 __commit 59 API calls 21244->21247 21246 2cbf8e0 21245->21246 21251 2cbf870 21245->21251 21248 2cb5e37 __commit 59 API calls 21246->21248 21249 2cbf828 21247->21249 21252 2cbf8e5 21248->21252 21250 2cb5e6b __cftof2_l 59 API calls 21249->21250 21261 2cbf830 __fsopen 21250->21261 21253 2cc0c97 ___lock_fhandle 60 API calls 21251->21253 21254 2cb5e6b __cftof2_l 59 API calls 21252->21254 21255 2cbf876 21253->21255 21256 2cbf8ed 21254->21256 21257 2cbf88c 21255->21257 21258 2cbf8a4 21255->21258 21259 2cb4f05 __cftof2_l 9 API calls 21256->21259 21260 2cbf902 __lseeki64_nolock 61 API calls 21257->21260 21262 2cb5e6b __cftof2_l 59 API calls 21258->21262 21259->21261 21263 2cbf89b 21260->21263 21261->21179 21264 2cbf8a9 21262->21264 21368 2cbf8d8 21263->21368 21265 2cb5e37 __commit 59 API calls 21264->21265 21265->21263 21268 2cc0ca3 __fsopen 21267->21268 21269 2cc0cf2 RtlEnterCriticalSection 21268->21269 21271 2cb88fd __lock 59 API calls 21268->21271 21270 2cc0d18 __fsopen 21269->21270 21270->21229 21272 2cc0cc8 21271->21272 21273 2cc0ce0 21272->21273 21275 2cb921c ___lock_fhandle InitializeCriticalSectionAndSpinCount 21272->21275 21338 2cc0d1c 21273->21338 21275->21273 21277 2cb9f61 __write_nolock 21276->21277 21278 2cb9fbf 21277->21278 21279 2cb9fa0 21277->21279 21310 2cb9f95 21277->21310 21282 2cba017 21278->21282 21283 2cb9ffb 21278->21283 21281 2cb5e37 __commit 59 API calls 21279->21281 21280 2cb455b __NMSG_WRITE 6 API calls 21284 2cba7b5 21280->21284 21285 2cb9fa5 21281->21285 21287 2cba030 21282->21287 21342 2cbf902 21282->21342 21286 2cb5e37 __commit 59 API calls 21283->21286 21284->21239 21288 2cb5e6b __cftof2_l 59 API calls 21285->21288 21290 2cba000 21286->21290 21289 2cbf7b2 __flsbuf 59 API calls 21287->21289 21292 2cb9fac 21288->21292 21293 2cba03e 21289->21293 21294 2cb5e6b __cftof2_l 59 API calls 21290->21294 21295 2cb4f05 __cftof2_l 9 API calls 21292->21295 21296 2cba397 21293->21296 21301 2cb5c6a CallCatchBlock 59 API calls 21293->21301 21297 2cba007 21294->21297 21295->21310 21298 2cba72a WriteFile 21296->21298 21299 2cba3b5 21296->21299 21300 2cb4f05 __cftof2_l 9 API calls 21297->21300 21302 2cba38a GetLastError 21298->21302 21309 2cba357 21298->21309 21303 2cba4d9 21299->21303 21320 2cba3cb 21299->21320 21300->21310 21304 2cba06a GetConsoleMode 21301->21304 21302->21309 21304->21296 21308 2cba0a9 21304->21308 21305 2cba763 21305->21310 21308->21296 21309->21305 21309->21310 21310->21280 21312 2cba43a WriteFile 21312->21302 21312->21320 21320->21305 21320->21309 21320->21312 21367 2cc103d RtlLeaveCriticalSection 21335->21367 21337 2cb9f32 21337->21234 21341 2cb8a67 RtlLeaveCriticalSection 21338->21341 21340 2cc0d23 21340->21269 21341->21340 21354 2cc0f54 21342->21354 21344 2cbf912 21345 2cbf92b SetFilePointerEx 21344->21345 21346 2cbf91a 21344->21346 21347 2cbf943 GetLastError 21345->21347 21350 2cbf91f 21345->21350 21348 2cb5e6b __cftof2_l 59 API calls 21346->21348 21348->21350 21350->21287 21355 2cc0f5f 21354->21355 21356 2cc0f74 21354->21356 21357 2cb5e37 __commit 59 API calls 21355->21357 21359 2cb5e37 __commit 59 API calls 21356->21359 21361 2cc0f99 21356->21361 21358 2cc0f64 21357->21358 21360 2cb5e6b __cftof2_l 59 API calls 21358->21360 21362 2cc0fa3 21359->21362 21363 2cc0f6c 21360->21363 21361->21344 21364 2cb5e6b __cftof2_l 59 API calls 21362->21364 21363->21344 21365 2cc0fab 21364->21365 21367->21337 21371 2cc103d RtlLeaveCriticalSection 21368->21371 21370 2cbf8de 21370->21261 21371->21370 21372->20194 21374 2cae345 __EH_prolog 21373->21374 21375 2cb3b5c _Allocate 60 API calls 21374->21375 21376 2cae34e 21375->21376 21377 2ca1bfa RtlEnterCriticalSection 21376->21377 21379 2cae55c 21376->21379 21377->20199 21380 2cae566 __EH_prolog 21379->21380 21383 2ca26db RtlEnterCriticalSection 21380->21383 21382 2cae5bc 21382->21377 21384 2ca2728 CreateWaitableTimerA 21383->21384 21385 2ca277e 21383->21385 21386 2ca275b SetWaitableTimer 21384->21386 21387 2ca2738 GetLastError 21384->21387 21388 2ca27d5 RtlLeaveCriticalSection 21385->21388 21390 2cb3b5c _Allocate 60 API calls 21385->21390 21386->21385 21389 2cb0b20 Mailbox 68 API calls 21387->21389 21388->21382 21391 2ca2745 21389->21391 21392 2ca278a 21390->21392 21427 2ca1712 21391->21427 21393 2ca27c8 21392->21393 21395 2cb3b5c _Allocate 60 API calls 21392->21395 21433 2ca7e0e 21393->21433 21396 2ca27a9 21395->21396 21399 2ca1cf8 CreateEventA 21396->21399 21400 2ca1d52 CreateEventA 21399->21400 21401 2ca1d23 GetLastError 21399->21401 21402 2ca1d6b GetLastError 21400->21402 21421 2ca1d96 21400->21421 21404 2ca1d33 21401->21404 21407 2ca1d7b 21402->21407 21403 2cb33c9 __beginthreadex 201 API calls 21405 2ca1db6 21403->21405 21406 2cb0b20 Mailbox 68 API calls 21404->21406 21408 2ca1e0d 21405->21408 21409 2ca1dc6 GetLastError 21405->21409 21410 2ca1d3c 21406->21410 21411 2cb0b20 Mailbox 68 API calls 21407->21411 21414 2ca1e1d 21408->21414 21415 2ca1e11 WaitForSingleObject CloseHandle 21408->21415 21416 2ca1dd8 21409->21416 21412 2ca1712 60 API calls 21410->21412 21413 2ca1d84 21411->21413 21417 2ca1d4e 21412->21417 21418 2ca1712 60 API calls 21413->21418 21414->21393 21415->21414 21419 2ca1ddf 21416->21419 21420 2ca1ddc CloseHandle 21416->21420 21417->21400 21418->21421 21422 2ca1de9 CloseHandle 21419->21422 21423 2ca1dee 21419->21423 21420->21419 21421->21403 21422->21423 21424 2cb0b20 Mailbox 68 API calls 21423->21424 21425 2ca1dfb 21424->21425 21426 2ca1712 60 API calls 21425->21426 21426->21408 21428 2ca171c __EH_prolog 21427->21428 21429 2ca173e 21428->21429 21430 2ca1815 Mailbox 59 API calls 21428->21430 21429->21386 21431 2ca1732 21430->21431 21436 2caa4ad 21431->21436 21434 2ca7e2a 21433->21434 21435 2ca7e1b CloseHandle 21433->21435 21434->21388 21435->21434 21437 2caa4b7 __EH_prolog 21436->21437 21444 2caca12 21437->21444 21441 2caa4d8 21442 2cb456a __CxxThrowException@8 RaiseException 21441->21442 21443 2caa4e6 21442->21443 21445 2cab239 std::bad_exception::bad_exception 60 API calls 21444->21445 21446 2caa4ca 21445->21446 21447 2caca4e 21446->21447 21448 2caca58 __EH_prolog 21447->21448 21451 2cab1e8 21448->21451 21450 2caca87 Mailbox 21450->21441 21452 2cab1f2 __EH_prolog 21451->21452 21453 2cab239 std::bad_exception::bad_exception 60 API calls 21452->21453 21454 2cab203 Mailbox 21453->21454 21454->21450 21466 2ca30ae WSASetLastError 21455->21466 21457 2ca3c90 21460 2ca16ae 21457->21460 21459 2ca30ae 71 API calls 21459->21457 21462 2ca16b8 __EH_prolog 21460->21462 21461 2ca1701 21461->20112 21462->21461 21463 2cb24e3 std::exception::exception 59 API calls 21462->21463 21464 2ca16dc 21463->21464 21465 2caa4ad 60 API calls 21464->21465 21465->21461 21467 2ca30ce 21466->21467 21468 2ca30ec WSAStringToAddressA 21466->21468 21467->21468 21469 2ca30d3 21467->21469 21470 2caa514 69 API calls 21468->21470 21471 2cb0b20 Mailbox 68 API calls 21469->21471 21472 2ca3114 21470->21472 21481 2ca30d8 21471->21481 21473 2ca3154 21472->21473 21479 2ca311e _memcmp 21472->21479 21474 2ca3135 21473->21474 21476 2cb0b20 Mailbox 68 API calls 21473->21476 21475 2ca3193 21474->21475 21477 2cb0b20 Mailbox 68 API calls 21474->21477 21480 2cb0b20 Mailbox 68 API calls 21475->21480 21475->21481 21476->21474 21477->21475 21478 2cb0b20 Mailbox 68 API calls 21478->21474 21479->21474 21479->21478 21480->21481 21481->21457 21481->21459 21483 2ca3bdd __EH_prolog 21482->21483 21484 2ca3bfe htonl htonl 21483->21484 21494 2cb24c7 21483->21494 21484->20214 21489 2ca3c20 __EH_prolog 21488->21489 21490 2ca3c41 21489->21490 21491 2cb24c7 std::bad_exception::bad_exception 59 API calls 21489->21491 21490->20214 21492 2ca3c35 21491->21492 21493 2caa662 60 API calls 21492->21493 21493->21490 21495 2cb24e3 std::exception::exception 59 API calls 21494->21495 21496 2ca3bf2 21495->21496 21497 2caa662 21496->21497 21498 2caa66c __EH_prolog 21497->21498 21505 2cacb85 21498->21505 21502 2caa687 21503 2cb456a __CxxThrowException@8 RaiseException 21502->21503 21504 2caa695 21503->21504 21512 2cb24ac 21505->21512 21508 2cacbc1 21509 2cacbcb __EH_prolog 21508->21509 21515 2cab557 21509->21515 21511 2cacbfa Mailbox 21511->21502 21513 2cb2523 std::exception::exception 59 API calls 21512->21513 21514 2caa679 21513->21514 21514->21508 21516 2cab561 __EH_prolog 21515->21516 21517 2cb24ac std::bad_exception::bad_exception 59 API calls 21516->21517 21518 2cab572 Mailbox 21517->21518 21518->21511 21540 2ca353e 21519->21540 21523 2ca2ae8 WSASetLastError connect 21522->21523 21524 2ca2ad8 21522->21524 21525 2caa514 69 API calls 21523->21525 21526 2cb0b20 Mailbox 68 API calls 21524->21526 21528 2ca2b07 21525->21528 21527 2ca2add 21526->21527 21530 2cb0b20 Mailbox 68 API calls 21527->21530 21528->21527 21529 2cb0b20 Mailbox 68 API calls 21528->21529 21529->21527 21531 2ca2b1b 21530->21531 21533 2cb0b20 Mailbox 68 API calls 21531->21533 21535 2ca2b38 21531->21535 21533->21535 21536 2ca2b87 21535->21536 21600 2ca3027 21535->21600 21536->20220 21539 2cb0b20 Mailbox 68 API calls 21539->21536 21541 2ca3548 __EH_prolog 21540->21541 21542 2ca3576 21541->21542 21543 2ca3557 21541->21543 21562 2ca2edd WSASetLastError WSASocketA 21542->21562 21544 2ca1996 68 API calls 21543->21544 21560 2ca355f 21544->21560 21547 2ca35ad CreateIoCompletionPort 21548 2ca35db 21547->21548 21549 2ca35c5 GetLastError 21547->21549 21551 2cb0b20 Mailbox 68 API calls 21548->21551 21550 2cb0b20 Mailbox 68 API calls 21549->21550 21552 2ca35d2 21550->21552 21551->21552 21553 2ca35ef 21552->21553 21554 2ca3626 21552->21554 21555 2cb0b20 Mailbox 68 API calls 21553->21555 21588 2cadefe 21554->21588 21556 2ca3608 21555->21556 21570 2ca29ee 21556->21570 21559 2ca3659 21561 2cb0b20 Mailbox 68 API calls 21559->21561 21560->20216 21561->21560 21563 2cb0b20 Mailbox 68 API calls 21562->21563 21564 2ca2f0a WSAGetLastError 21563->21564 21565 2ca2f41 21564->21565 21566 2ca2f21 21564->21566 21565->21547 21565->21560 21567 2ca2f3c 21566->21567 21568 2ca2f27 setsockopt 21566->21568 21569 2cb0b20 Mailbox 68 API calls 21567->21569 21568->21567 21569->21565 21571 2ca2a0c 21570->21571 21587 2ca2aad 21570->21587 21573 2ca2a39 WSASetLastError closesocket 21571->21573 21577 2cb0b20 Mailbox 68 API calls 21571->21577 21572 2cb0b20 Mailbox 68 API calls 21574 2ca2ab8 21572->21574 21575 2caa514 69 API calls 21573->21575 21574->21560 21576 2ca2a51 21575->21576 21580 2cb0b20 Mailbox 68 API calls 21576->21580 21576->21587 21578 2ca2a21 21577->21578 21592 2ca2f50 21578->21592 21582 2ca2a5c 21580->21582 21583 2ca2a7b ioctlsocket WSASetLastError closesocket 21582->21583 21584 2cb0b20 Mailbox 68 API calls 21582->21584 21586 2caa514 69 API calls 21583->21586 21585 2ca2a6e 21584->21585 21585->21583 21585->21587 21586->21587 21587->21572 21587->21574 21589 2cadf08 __EH_prolog 21588->21589 21590 2cb3b5c _Allocate 60 API calls 21589->21590 21591 2cadf1c 21590->21591 21591->21559 21593 2ca2f5b 21592->21593 21594 2ca2f70 WSASetLastError setsockopt 21592->21594 21595 2cb0b20 Mailbox 68 API calls 21593->21595 21596 2caa514 69 API calls 21594->21596 21597 2ca2a36 21595->21597 21598 2ca2f9e 21596->21598 21597->21573 21598->21597 21599 2cb0b20 Mailbox 68 API calls 21598->21599 21599->21597 21601 2ca303b 21600->21601 21602 2ca304d WSASetLastError select 21600->21602 21603 2cb0b20 Mailbox 68 API calls 21601->21603 21604 2caa514 69 API calls 21602->21604 21607 2ca2b59 21603->21607 21605 2ca3095 21604->21605 21606 2cb0b20 Mailbox 68 API calls 21605->21606 21605->21607 21606->21607 21607->21536 21608 2ca2fb4 21607->21608 21609 2ca2fc0 21608->21609 21610 2ca2fd5 WSASetLastError getsockopt 21608->21610 21612 2cb0b20 Mailbox 68 API calls 21609->21612 21611 2caa514 69 API calls 21610->21611 21613 2ca300f 21611->21613 21615 2ca2b7a 21612->21615 21614 2cb0b20 Mailbox 68 API calls 21613->21614 21613->21615 21614->21615 21615->21536 21615->21539 21623 2cc5400 21616->21623 21618 2ca32b5 RtlEnterCriticalSection 21619 2cb0b20 Mailbox 68 API calls 21618->21619 21620 2ca32d6 21619->21620 21624 2ca3307 21620->21624 21623->21618 21626 2ca3311 __EH_prolog 21624->21626 21627 2ca3350 21626->21627 21636 2ca7e8d 21626->21636 21640 2ca239d 21627->21640 21630 2cb0b20 Mailbox 68 API calls 21632 2ca337c 21630->21632 21634 2ca2d39 71 API calls 21632->21634 21635 2ca3390 21634->21635 21646 2ca7e36 21635->21646 21639 2ca7e9b 21636->21639 21637 2ca7f11 21637->21626 21639->21637 21650 2ca89f2 21639->21650 21644 2ca23ab 21640->21644 21641 2ca2417 21641->21630 21641->21635 21642 2ca23c1 PostQueuedCompletionStatus 21643 2ca23da RtlEnterCriticalSection 21642->21643 21642->21644 21643->21644 21644->21641 21644->21642 21645 2ca23f8 InterlockedExchange RtlLeaveCriticalSection 21644->21645 21645->21644 21648 2ca7e3b 21646->21648 21647 2ca32ee RtlLeaveCriticalSection 21647->20235 21648->21647 21666 2ca1e7f 21648->21666 21651 2ca8a1c 21650->21651 21652 2ca7e36 68 API calls 21651->21652 21653 2ca8a62 21652->21653 21654 2ca8a89 21653->21654 21656 2caa27f 21653->21656 21654->21637 21657 2caa289 21656->21657 21658 2caa299 21656->21658 21657->21658 21661 2cafb3d 21657->21661 21658->21654 21662 2cb24e3 std::exception::exception 59 API calls 21661->21662 21663 2cafb55 21662->21663 21664 2cb456a __CxxThrowException@8 RaiseException 21663->21664 21665 2cafb6a 21664->21665 21667 2cb0b20 Mailbox 68 API calls 21666->21667 21668 2ca1e90 21667->21668 21668->21648 21670 2cb289b 21669->21670 21671 2cb5e6b __cftof2_l 59 API calls 21670->21671 21674 2cb28ab _strlen 21670->21674 21672 2cb28a0 21671->21672 21673 2cb4f05 __cftof2_l 9 API calls 21672->21673 21673->21674 21674->20243 21676 2caa71d GetProcessHeap HeapFree 21675->21676 21676->20256 21678 2ca3770 21677->21678 21679 2ca3755 InterlockedCompareExchange 21677->21679 21681 2cb0b20 Mailbox 68 API calls 21678->21681 21679->21678 21680 2ca3765 21679->21680 21682 2ca32ab 78 API calls 21680->21682 21683 2ca3779 21681->21683 21682->21678 21684 2ca29ee 76 API calls 21683->21684 21685 2ca378e 21684->21685 21685->20262 21715 2cb36bd 21686->21715 21688 2ca53c8 21688->20272 21689 2cb3916 21688->21689 21690 2cb3922 __fsopen 21689->21690 21691 2cb3958 21690->21691 21692 2cb3940 21690->21692 21694 2cb3950 __fsopen 21690->21694 21857 2cb9802 21691->21857 21693 2cb5e6b __cftof2_l 59 API calls 21692->21693 21696 2cb3945 21693->21696 21694->20274 21698 2cb4f05 __cftof2_l 9 API calls 21696->21698 21698->21694 21703 2cb3aa0 __fsopen 21702->21703 21704 2cb3acc 21703->21704 21705 2cb3ab4 21703->21705 21708 2cb9802 __lock_file 60 API calls 21704->21708 21714 2cb3ac4 __fsopen 21704->21714 21706 2cb5e6b __cftof2_l 59 API calls 21705->21706 21707 2cb3ab9 21706->21707 21709 2cb4f05 __cftof2_l 9 API calls 21707->21709 21710 2cb3ade 21708->21710 21709->21714 21884 2cb3a28 21710->21884 21714->20272 21717 2cb36c9 __fsopen 21715->21717 21716 2cb36db 21718 2cb5e6b __cftof2_l 59 API calls 21716->21718 21717->21716 21719 2cb3708 21717->21719 21720 2cb36e0 21718->21720 21734 2cb98d8 21719->21734 21722 2cb4f05 __cftof2_l 9 API calls 21720->21722 21732 2cb36eb __fsopen @_EH4_CallFilterFunc@8 21722->21732 21723 2cb370d 21724 2cb3723 21723->21724 21725 2cb3716 21723->21725 21727 2cb374c 21724->21727 21728 2cb372c 21724->21728 21726 2cb5e6b __cftof2_l 59 API calls 21725->21726 21726->21732 21749 2cb99f7 21727->21749 21730 2cb5e6b __cftof2_l 59 API calls 21728->21730 21730->21732 21732->21688 21735 2cb98e4 __fsopen 21734->21735 21736 2cb88fd __lock 59 API calls 21735->21736 21746 2cb98f2 21736->21746 21737 2cb996d 21738 2cb8ac4 __malloc_crt 59 API calls 21737->21738 21740 2cb9974 21738->21740 21742 2cb921c ___lock_fhandle InitializeCriticalSectionAndSpinCount 21740->21742 21747 2cb9966 21740->21747 21741 2cb99e3 __fsopen 21741->21723 21745 2cb999a RtlEnterCriticalSection 21742->21745 21743 2cb8985 __mtinitlocknum 59 API calls 21743->21746 21745->21747 21746->21737 21746->21743 21746->21747 21769 2cb9841 21746->21769 21774 2cb98ab 21746->21774 21779 2cb99ee 21747->21779 21759 2cb9a14 21749->21759 21750 2cb9a28 21751 2cb5e6b __cftof2_l 59 API calls 21750->21751 21753 2cb9a2d 21751->21753 21752 2cb9bcf 21752->21750 21755 2cb9c2b 21752->21755 21754 2cb4f05 __cftof2_l 9 API calls 21753->21754 21757 2cb3757 21754->21757 21790 2cc0840 21755->21790 21766 2cb3779 21757->21766 21759->21750 21759->21752 21784 2cc085e 21759->21784 21763 2cc098d __openfile 59 API calls 21764 2cb9be7 21763->21764 21764->21752 21765 2cc098d __openfile 59 API calls 21764->21765 21765->21752 21850 2cb9871 21766->21850 21768 2cb377f 21768->21732 21770 2cb984c 21769->21770 21771 2cb9862 RtlEnterCriticalSection 21769->21771 21772 2cb88fd __lock 59 API calls 21770->21772 21771->21746 21773 2cb9855 21772->21773 21773->21746 21775 2cb98b9 21774->21775 21776 2cb98cc RtlLeaveCriticalSection 21774->21776 21782 2cb8a67 RtlLeaveCriticalSection 21775->21782 21776->21746 21778 2cb98c9 21778->21746 21783 2cb8a67 RtlLeaveCriticalSection 21779->21783 21781 2cb99f5 21781->21741 21782->21778 21783->21781 21793 2cc0876 21784->21793 21786 2cb9b95 21786->21750 21787 2cc098d 21786->21787 21801 2cc09a5 21787->21801 21789 2cb9bc8 21789->21752 21789->21763 21808 2cc0729 21790->21808 21792 2cc0859 21792->21757 21794 2cc088b 21793->21794 21800 2cc0884 21793->21800 21795 2cb228b _LocaleUpdate::_LocaleUpdate 59 API calls 21794->21795 21796 2cc0898 21795->21796 21797 2cb5e6b __cftof2_l 59 API calls 21796->21797 21796->21800 21798 2cc08cb 21797->21798 21799 2cb4f05 __cftof2_l 9 API calls 21798->21799 21799->21800 21800->21786 21802 2cb228b _LocaleUpdate::_LocaleUpdate 59 API calls 21801->21802 21803 2cc09b8 21802->21803 21804 2cc09cd 21803->21804 21805 2cb5e6b __cftof2_l 59 API calls 21803->21805 21804->21789 21806 2cc09f9 21805->21806 21807 2cb4f05 __cftof2_l 9 API calls 21806->21807 21807->21804 21810 2cc0735 __fsopen 21808->21810 21809 2cc074b 21811 2cb5e6b __cftof2_l 59 API calls 21809->21811 21810->21809 21812 2cc0781 21810->21812 21813 2cc0750 21811->21813 21819 2cc07f2 21812->21819 21815 2cb4f05 __cftof2_l 9 API calls 21813->21815 21818 2cc075a __fsopen 21815->21818 21818->21792 21828 2cb8246 21819->21828 21821 2cc079d 21824 2cc07c6 21821->21824 21822 2cc0806 21822->21821 21823 2cb2f84 _free 59 API calls 21822->21823 21823->21821 21825 2cc07cc 21824->21825 21826 2cc07f0 21824->21826 21849 2cc103d RtlLeaveCriticalSection 21825->21849 21826->21818 21829 2cb8269 21828->21829 21830 2cb8253 21828->21830 21829->21830 21832 2cb8270 ___crtIsPackagedApp 21829->21832 21831 2cb5e6b __cftof2_l 59 API calls 21830->21831 21833 2cb8258 21831->21833 21835 2cb8279 AreFileApisANSI 21832->21835 21836 2cb8286 MultiByteToWideChar 21832->21836 21834 2cb4f05 __cftof2_l 9 API calls 21833->21834 21844 2cb8262 21834->21844 21835->21836 21837 2cb8283 21835->21837 21838 2cb82b1 21836->21838 21839 2cb82a0 GetLastError 21836->21839 21837->21836 21840 2cb8ac4 __malloc_crt 59 API calls 21838->21840 21841 2cb5e4a __dosmaperr 59 API calls 21839->21841 21842 2cb82b9 21840->21842 21841->21844 21843 2cb82c0 MultiByteToWideChar 21842->21843 21842->21844 21843->21844 21845 2cb82d6 GetLastError 21843->21845 21844->21822 21846 2cb5e4a __dosmaperr 59 API calls 21845->21846 21847 2cb82e2 21846->21847 21848 2cb2f84 _free 59 API calls 21847->21848 21848->21844 21849->21826 21851 2cb989f RtlLeaveCriticalSection 21850->21851 21852 2cb9880 21850->21852 21851->21768 21852->21851 21853 2cb9887 21852->21853 21856 2cb8a67 RtlLeaveCriticalSection 21853->21856 21855 2cb989c 21855->21768 21856->21855 21858 2cb9812 21857->21858 21859 2cb9834 RtlEnterCriticalSection 21857->21859 21858->21859 21861 2cb981a 21858->21861 21860 2cb395e 21859->21860 21863 2cb37bd 21860->21863 21862 2cb88fd __lock 59 API calls 21861->21862 21862->21860 21866 2cb37cc 21863->21866 21870 2cb37ea 21863->21870 21864 2cb37da 21865 2cb5e6b __cftof2_l 59 API calls 21864->21865 21867 2cb37df 21865->21867 21866->21864 21869 2cb3804 _memmove 21866->21869 21866->21870 21868 2cb4f05 __cftof2_l 9 API calls 21867->21868 21868->21870 21869->21870 21871 2cb5f11 __flsbuf 79 API calls 21869->21871 21873 2cb9e41 __fflush_nolock 59 API calls 21869->21873 21874 2cb9e65 __write 79 API calls 21869->21874 21878 2cba7ff 21869->21878 21875 2cb3990 21870->21875 21871->21869 21873->21869 21874->21869 21876 2cb9871 __fsopen 2 API calls 21875->21876 21877 2cb3996 21876->21877 21877->21694 21879 2cba812 21878->21879 21883 2cba836 21878->21883 21880 2cb9e41 __fflush_nolock 59 API calls 21879->21880 21879->21883 21881 2cba82f 21880->21881 21882 2cb9e65 __write 79 API calls 21881->21882 21882->21883 21883->21869 21885 2cb3a4b 21884->21885 21886 2cb3a37 21884->21886 21889 2cba7ff __flush 79 API calls 21885->21889 21898 2cb3a47 21885->21898 21887 2cb5e6b __cftof2_l 59 API calls 21886->21887 21888 2cb3a3c 21887->21888 21890 2cb4f05 __cftof2_l 9 API calls 21888->21890 21891 2cb3a57 21889->21891 21890->21898 21903 2cbb2ab 21891->21903 21894 2cb9e41 __fflush_nolock 59 API calls 21895 2cb3a65 21894->21895 21907 2cbb136 21895->21907 21897 2cb3a6b 21897->21898 21899 2cb2f84 _free 59 API calls 21897->21899 21900 2cb3b03 21898->21900 21899->21898 21901 2cb9871 __fsopen 2 API calls 21900->21901 21902 2cb3b09 21901->21902 21902->21714 21904 2cb3a5f 21903->21904 21905 2cbb2b8 21903->21905 21904->21894 21905->21904 21906 2cb2f84 _free 59 API calls 21905->21906 21906->21904 21908 2cbb142 __fsopen 21907->21908 21909 2cbb14f 21908->21909 21910 2cbb166 21908->21910 21911 2cb5e37 __commit 59 API calls 21909->21911 21912 2cbb1f1 21910->21912 21914 2cbb176 21910->21914 21913 2cbb154 21911->21913 21915 2cb5e37 __commit 59 API calls 21912->21915 21916 2cb5e6b __cftof2_l 59 API calls 21913->21916 21917 2cbb19e 21914->21917 21918 2cbb194 21914->21918 21919 2cbb199 21915->21919 21929 2cbb15b __fsopen 21916->21929 21920 2cc0c97 ___lock_fhandle 60 API calls 21917->21920 21921 2cb5e37 __commit 59 API calls 21918->21921 21922 2cb5e6b __cftof2_l 59 API calls 21919->21922 21923 2cbb1a4 21920->21923 21921->21919 21924 2cbb1fd 21922->21924 21925 2cbb1c2 21923->21925 21926 2cbb1b7 21923->21926 21927 2cb4f05 __cftof2_l 9 API calls 21924->21927 21930 2cb5e6b __cftof2_l 59 API calls 21925->21930 21933 2cbb211 21926->21933 21927->21929 21929->21897 21931 2cbb1bd 21930->21931 21948 2cbb1e9 21931->21948 21934 2cc0f54 __commit 59 API calls 21933->21934 21936 2cbb21f 21934->21936 21935 2cbb275 21936->21935 21937 2cbb253 21936->21937 21939 2cc0f54 __commit 59 API calls 21936->21939 21937->21935 21961 402a3d 21962 402a4f RegQueryValueExA 21961->21962 21963 40d197 21962->21963 21964 40d19d 21963->21964 21965 40d93a RegCloseKey 21963->21965 21967 40d47f RegOpenKeyExA 21964->21967 21968 40de12 21964->21968 21967->21964 21969 2cdfb30 21970 2d28fd6 CreateFileA 21969->21970 21971 2d28fe1 21970->21971 21972 4022fe 21973 402303 21972->21973 21977 2cb3d1f 21973->21977 21975 402b80 21978 2cb3d28 21977->21978 21979 2cb3d2d 21977->21979 21991 2cbb8f1 21978->21991 21983 2cb3d42 21979->21983 21982 402b6a Sleep 21982->21975 21984 2cb3d4e __fsopen 21983->21984 21988 2cb3d9c ___DllMainCRTStartup 21984->21988 21990 2cb3df9 __fsopen 21984->21990 21995 2cb3bad 21984->21995 21986 2cb3dd6 21987 2cb3bad __CRT_INIT@12 138 API calls 21986->21987 21986->21990 21987->21990 21988->21986 21989 2cb3bad __CRT_INIT@12 138 API calls 21988->21989 21988->21990 21989->21986 21990->21982 21992 2cbb921 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 21991->21992 21993 2cbb914 21991->21993 21994 2cbb918 21992->21994 21993->21992 21993->21994 21994->21979 21996 2cb3bb9 __fsopen 21995->21996 21997 2cb3c3b 21996->21997 21998 2cb3bc1 21996->21998 22000 2cb3c3f 21997->22000 22001 2cb3ca4 21997->22001 22043 2cb81f6 GetProcessHeap 21998->22043 22005 2cb3c60 22000->22005 22012 2cb3bca __fsopen __CRT_INIT@12 22000->22012 22144 2cb846b 22000->22144 22003 2cb3ca9 22001->22003 22004 2cb3d07 22001->22004 22002 2cb3bc6 22002->22012 22044 2cb5da4 22002->22044 22006 2cb91db __CRT_INIT@12 TlsGetValue 22003->22006 22007 2cb5c34 __freeptd 59 API calls 22004->22007 22004->22012 22147 2cb8342 RtlDecodePointer 22005->22147 22010 2cb3cb4 22006->22010 22007->22012 22010->22012 22015 2cb8a7c __calloc_crt 59 API calls 22010->22015 22012->21988 22013 2cb3bd6 __RTC_Initialize 22013->22012 22019 2cb3be6 GetCommandLineA 22013->22019 22017 2cb3cc5 22015->22017 22017->22012 22023 2cb91fa __CRT_INIT@12 TlsSetValue 22017->22023 22018 2cbb58f __ioterm 60 API calls 22020 2cb3c71 22018->22020 22065 2cbb98d GetEnvironmentStringsW 22019->22065 22021 2cb5e1a __mtterm 62 API calls 22020->22021 22028 2cb3c76 __CRT_INIT@12 22021->22028 22025 2cb3cdd 22023->22025 22026 2cb3cfb 22025->22026 22027 2cb3ce3 22025->22027 22031 2cb2f84 _free 59 API calls 22026->22031 22030 2cb5cf1 __initptd 59 API calls 22027->22030 22171 2cb3c8f 22028->22171 22033 2cb3ceb GetCurrentThreadId 22030->22033 22031->22012 22032 2cb3c00 22034 2cb3c04 22032->22034 22097 2cbb5e1 22032->22097 22033->22012 22130 2cb5e1a 22034->22130 22043->22002 22175 2cb8512 RtlEncodePointer 22044->22175 22046 2cb5da9 22180 2cb8a2e 22046->22180 22049 2cb5db2 22051 2cb5e1a __mtterm 62 API calls 22049->22051 22052 2cb5db7 22051->22052 22052->22013 22054 2cb5dcf 22055 2cb8a7c __calloc_crt 59 API calls 22054->22055 22056 2cb5ddc 22055->22056 22057 2cb5e11 22056->22057 22058 2cb91fa __CRT_INIT@12 TlsSetValue 22056->22058 22059 2cb5e1a __mtterm 62 API calls 22057->22059 22060 2cb5df0 22058->22060 22061 2cb5e16 22059->22061 22060->22057 22062 2cb5df6 22060->22062 22061->22013 22063 2cb5cf1 __initptd 59 API calls 22062->22063 22064 2cb5dfe GetCurrentThreadId 22063->22064 22064->22013 22066 2cbb9a0 WideCharToMultiByte 22065->22066 22067 2cb3bf6 22065->22067 22069 2cbba0a FreeEnvironmentStringsW 22066->22069 22070 2cbb9d3 22066->22070 22078 2cbb2db 22067->22078 22069->22067 22071 2cb8ac4 __malloc_crt 59 API calls 22070->22071 22072 2cbb9d9 22071->22072 22072->22069 22073 2cbb9e0 WideCharToMultiByte 22072->22073 22074 2cbb9ff FreeEnvironmentStringsW 22073->22074 22075 2cbb9f6 22073->22075 22074->22067 22076 2cb2f84 _free 59 API calls 22075->22076 22077 2cbb9fc 22076->22077 22077->22074 22079 2cbb2e7 __fsopen 22078->22079 22080 2cb88fd __lock 59 API calls 22079->22080 22081 2cbb2ee 22080->22081 22082 2cb8a7c __calloc_crt 59 API calls 22081->22082 22084 2cbb2ff 22082->22084 22083 2cbb36a GetStartupInfoW 22086 2cbb4ae 22083->22086 22089 2cbb37f 22083->22089 22084->22083 22085 2cbb30a __fsopen @_EH4_CallFilterFunc@8 22084->22085 22085->22032 22087 2cbb576 22086->22087 22091 2cbb4fb GetStdHandle 22086->22091 22093 2cbb50e GetFileType 22086->22093 22096 2cb921c ___lock_fhandle InitializeCriticalSectionAndSpinCount 22086->22096 22188 2cbb586 22087->22188 22089->22086 22090 2cb8a7c __calloc_crt 59 API calls 22089->22090 22092 2cbb3cd 22089->22092 22090->22089 22091->22086 22092->22086 22094 2cbb401 GetFileType 22092->22094 22095 2cb921c ___lock_fhandle InitializeCriticalSectionAndSpinCount 22092->22095 22093->22086 22094->22092 22095->22092 22096->22086 22098 2cbb5ef 22097->22098 22099 2cbb5f4 GetModuleFileNameA 22097->22099 22198 2cb529a 22098->22198 22101 2cbb621 22099->22101 22192 2cbb694 22101->22192 22131 2cb5e24 22130->22131 22133 2cb5e2a 22130->22133 22324 2cb91bc 22131->22324 22134 2cb8963 22133->22134 22135 2cb8947 RtlDeleteCriticalSection 22133->22135 22137 2cb896f RtlDeleteCriticalSection 22134->22137 22138 2cb8982 22134->22138 22136 2cb2f84 _free 59 API calls 22135->22136 22136->22133 22137->22134 22138->22012 22145 2cb85b4 _doexit 59 API calls 22144->22145 22146 2cb8476 22145->22146 22146->22005 22148 2cb835c 22147->22148 22149 2cb836e 22147->22149 22148->22149 22151 2cb2f84 _free 59 API calls 22148->22151 22150 2cb2f84 _free 59 API calls 22149->22150 22153 2cb837b 22150->22153 22151->22148 22152 2cb839f 22154 2cb2f84 _free 59 API calls 22152->22154 22153->22152 22155 2cb2f84 _free 59 API calls 22153->22155 22156 2cb83ab 22154->22156 22155->22153 22157 2cb2f84 _free 59 API calls 22156->22157 22158 2cb83bc 22157->22158 22159 2cb2f84 _free 59 API calls 22158->22159 22160 2cb83c7 22159->22160 22161 2cb83ec RtlEncodePointer 22160->22161 22166 2cb2f84 _free 59 API calls 22160->22166 22162 2cb8407 22161->22162 22163 2cb8401 22161->22163 22165 2cb841d 22162->22165 22167 2cb2f84 _free 59 API calls 22162->22167 22164 2cb2f84 _free 59 API calls 22163->22164 22164->22162 22168 2cb3c65 22165->22168 22170 2cb2f84 _free 59 API calls 22165->22170 22169 2cb83eb 22166->22169 22167->22165 22168->22018 22168->22028 22169->22161 22170->22168 22172 2cb3c93 22171->22172 22173 2cb3ca1 22171->22173 22172->22173 22174 2cb5e1a __mtterm 62 API calls 22172->22174 22173->22012 22174->22173 22176 2cb8523 __init_pointers __initp_misc_winsig 22175->22176 22187 2cb3a17 RtlEncodePointer 22176->22187 22178 2cb853b __init_pointers 22179 2cb928a 34 API calls 22178->22179 22179->22046 22181 2cb8a3a 22180->22181 22182 2cb5dae 22181->22182 22183 2cb921c ___lock_fhandle InitializeCriticalSectionAndSpinCount 22181->22183 22182->22049 22184 2cb919e 22182->22184 22183->22181 22185 2cb91b5 TlsAlloc 22184->22185 22186 2cb5dc4 22184->22186 22186->22049 22186->22054 22187->22178 22191 2cb8a67 RtlLeaveCriticalSection 22188->22191 22190 2cbb58d 22190->22085 22191->22190 22194 2cbb6b6 22192->22194 22197 2cbb71a 22194->22197 22202 2cc15e6 22194->22202 22195 2cbb637 22196 2cc15e6 _parse_cmdline 59 API calls 22196->22197 22197->22195 22197->22196 22199 2cb52a3 22198->22199 22200 2cb52aa 22198->22200 22208 2cb55f7 22199->22208 22200->22099 22205 2cc158c 22202->22205 22209 2cb5603 __fsopen 22208->22209 22210 2cb5c6a CallCatchBlock 59 API calls 22209->22210 22325 2cb91cf 22324->22325 22326 2cb91d3 TlsFree 22324->22326 22325->22133 22326->22133 22327 2cdf872 DnsQuery_A 22328 2cdf886 22327->22328

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 2ca72ab-2ca72c3 InternetOpenA 1 2ca7389-2ca738f 0->1 2 2ca72c9-2ca7340 InternetSetOptionA * 3 call 2cb4b00 InternetOpenUrlA 0->2 3 2ca73ab-2ca73b9 1->3 4 2ca7391-2ca7397 1->4 15 2ca7382-2ca7383 InternetCloseHandle 2->15 16 2ca7342 2->16 8 2ca73bf-2ca73e3 call 2cb4b00 call 2ca439c 3->8 9 2ca66f4-2ca66f6 3->9 6 2ca7399-2ca739b 4->6 7 2ca739d-2ca73aa call 2ca53ec 4->7 6->3 7->3 8->9 33 2ca73e9-2ca7417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb234c 8->33 13 2ca66f8-2ca66fd 9->13 14 2ca66ff-2ca6701 9->14 21 2ca6708 Sleep 13->21 19 2ca670e-2ca6742 RtlEnterCriticalSection RtlLeaveCriticalSection 14->19 20 2ca6703 14->20 15->1 22 2ca7346-2ca736c InternetReadFile 16->22 25 2ca6792 19->25 26 2ca6744-2ca6750 19->26 20->21 21->19 23 2ca736e-2ca7375 22->23 24 2ca7377-2ca737e InternetCloseHandle 22->24 23->22 24->15 29 2ca6796 25->29 26->25 28 2ca6752-2ca675f 26->28 31 2ca6761-2ca6765 28->31 32 2ca6767-2ca6768 28->32 29->0 35 2ca676c-2ca6790 call 2cb4b00 * 2 31->35 32->35 38 2ca7419-2ca742b call 2cb234c 33->38 39 2ca746d-2ca7488 call 2cb234c 33->39 35->29 38->39 49 2ca742d-2ca743f call 2cb234c 38->49 47 2ca748e-2ca7490 39->47 48 2ca7742-2ca7754 call 2cb234c 39->48 47->48 50 2ca7496-2ca7548 call 2cb2fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb4b00 * 5 call 2ca439c * 2 47->50 57 2ca779d-2ca77af call 2cb234c 48->57 58 2ca7756-2ca7758 48->58 49->39 59 2ca7441-2ca7453 call 2cb234c 49->59 112 2ca754a-2ca754c 50->112 113 2ca7585 50->113 70 2ca77d0-2ca77e2 call 2cb234c 57->70 71 2ca77b1-2ca77cb call 2ca61f5 call 2ca6303 call 2ca640e 57->71 58->57 61 2ca775a-2ca7798 call 2cb4b00 RtlEnterCriticalSection RtlLeaveCriticalSection 58->61 59->39 72 2ca7455-2ca7467 call 2cb234c 59->72 61->9 81 2ca77e8-2ca77ea 70->81 82 2ca7b00-2ca7b12 call 2cb234c 70->82 71->9 72->9 72->39 81->82 86 2ca77f0-2ca7807 call 2ca439c 81->86 82->9 94 2ca7b18-2ca7b46 call 2cb2fbc call 2cb4b00 call 2ca439c 82->94 86->9 98 2ca780d-2ca78db call 2cb2428 call 2ca1ba7 86->98 120 2ca7b48-2ca7b4a call 2ca534d 94->120 121 2ca7b4f-2ca7b56 call 2cb2f84 94->121 115 2ca78dd call 2ca143f 98->115 116 2ca78e2-2ca7903 RtlEnterCriticalSection 98->116 112->113 119 2ca754e-2ca7560 call 2cb234c 112->119 122 2ca7589-2ca75b7 call 2cb2fbc call 2cb4b00 call 2ca439c 113->122 115->116 117 2ca790f-2ca7973 RtlLeaveCriticalSection call 2ca3c67 call 2ca3d7e call 2ca8346 116->117 118 2ca7905-2ca790c 116->118 146 2ca7979-2ca79c1 call 2caa730 117->146 147 2ca7ae7-2ca7afb call 2ca900e 117->147 118->117 119->113 134 2ca7562-2ca7583 call 2ca439c 119->134 120->121 121->9 144 2ca75f8-2ca7601 call 2cb2f84 122->144 145 2ca75b9-2ca75c8 call 2cb35f6 122->145 134->122 156 2ca7738-2ca773b 144->156 157 2ca7607-2ca761f call 2cb3b5c 144->157 145->144 158 2ca75ca 145->158 159 2ca7ab1-2ca7ae2 call 2ca83f5 call 2ca33b2 146->159 160 2ca79c7-2ca79ce 146->160 147->9 156->48 169 2ca762b 157->169 170 2ca7621-2ca7629 call 2ca9742 157->170 162 2ca75cf-2ca75e1 call 2cb2860 158->162 159->147 164 2ca79d1-2ca79d6 160->164 177 2ca75e3 162->177 178 2ca75e6-2ca75f6 call 2cb35f6 162->178 164->164 168 2ca79d8-2ca7a23 call 2caa730 164->168 168->159 179 2ca7a29-2ca7a2f 168->179 176 2ca762d-2ca76e5 call 2caa85a call 2ca3863 call 2ca5119 call 2ca3863 call 2caab00 call 2caac1a 169->176 170->176 202 2ca76ec-2ca7717 Sleep call 2cb1900 176->202 203 2ca76e7 call 2ca380b 176->203 177->178 178->144 178->162 183 2ca7a32-2ca7a37 179->183 183->183 186 2ca7a39-2ca7a74 call 2caa730 183->186 186->159 192 2ca7a76-2ca7ab0 call 2cad122 186->192 192->159 207 2ca7719-2ca7722 call 2ca4100 202->207 208 2ca7723-2ca7731 202->208 203->202 207->208 208->156 210 2ca7733 call 2ca380b 208->210 210->156
                                                      APIs
                                                      • Sleep.KERNEL32(0000EA60), ref: 02CA6708
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA6713
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA6724
                                                      • _memset.LIBCMT ref: 02CA6779
                                                      • _memset.LIBCMT ref: 02CA6788
                                                      • InternetOpenA.WININET(?), ref: 02CA72B5
                                                      • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02CA72DD
                                                      • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02CA72F5
                                                      • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02CA730D
                                                      • _memset.LIBCMT ref: 02CA731D
                                                      • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02CA7336
                                                      • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02CA7358
                                                      • InternetCloseHandle.WININET(00000000), ref: 02CA7378
                                                      • InternetCloseHandle.WININET(00000000), ref: 02CA7383
                                                      • _memset.LIBCMT ref: 02CA73CB
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA73EE
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA73FF
                                                      • _malloc.LIBCMT ref: 02CA7498
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA74AA
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA74B6
                                                      • _memset.LIBCMT ref: 02CA74D0
                                                      • _memset.LIBCMT ref: 02CA74DF
                                                      • _memset.LIBCMT ref: 02CA74EF
                                                      • _memset.LIBCMT ref: 02CA7502
                                                      • _memset.LIBCMT ref: 02CA7518
                                                      • _malloc.LIBCMT ref: 02CA758E
                                                      • _memset.LIBCMT ref: 02CA759F
                                                      • _strtok.LIBCMT ref: 02CA75BF
                                                      • _swscanf.LIBCMT ref: 02CA75D6
                                                      • _strtok.LIBCMT ref: 02CA75ED
                                                      • _free.LIBCMT ref: 02CA75F9
                                                      • Sleep.KERNEL32(000007D0), ref: 02CA76F1
                                                      • _memset.LIBCMT ref: 02CA7765
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA7772
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA7784
                                                      • _sprintf.LIBCMT ref: 02CA7822
                                                      • RtlEnterCriticalSection.NTDLL(00000020), ref: 02CA78E6
                                                      • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02CA791A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                      • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                      • API String ID: 696907137-1839899575
                                                      • Opcode ID: dec9968577aed8de4753aa075741df4e8959650fadd5e21cfa3539115f6a7c20
                                                      • Instruction ID: dfaa188dfb1aeb82f13792c3f9d218c2b0556d181d04dc38fc8d7bfc58a1ea7d
                                                      • Opcode Fuzzy Hash: dec9968577aed8de4753aa075741df4e8959650fadd5e21cfa3539115f6a7c20
                                                      • Instruction Fuzzy Hash: A13223315483829FE7359B24DC24BAFB7EAAFC5318F24092DF58A97291DB709508CB52

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 213 2ca648b-2ca66f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2ca42c7 GetTickCount call 2ca605a GetVersionExA call 2cb4b00 call 2cb2fbc * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2cb4b00 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb2fbc * 4 QueryPerformanceCounter Sleep call 2cb2fbc * 2 call 2cb4b00 * 2 258 2ca66f4-2ca66f6 213->258 259 2ca66f8-2ca66fd 258->259 260 2ca66ff-2ca6701 258->260 263 2ca6708 Sleep 259->263 261 2ca670e-2ca6742 RtlEnterCriticalSection RtlLeaveCriticalSection 260->261 262 2ca6703 260->262 264 2ca6792 261->264 265 2ca6744-2ca6750 261->265 262->263 263->261 267 2ca6796-2ca72c3 InternetOpenA 264->267 265->264 266 2ca6752-2ca675f 265->266 268 2ca6761-2ca6765 266->268 269 2ca6767-2ca6768 266->269 272 2ca7389-2ca738f 267->272 273 2ca72c9-2ca7340 InternetSetOptionA * 3 call 2cb4b00 InternetOpenUrlA 267->273 271 2ca676c-2ca6790 call 2cb4b00 * 2 268->271 269->271 271->267 274 2ca73ab-2ca73b9 272->274 275 2ca7391-2ca7397 272->275 286 2ca7382-2ca7383 InternetCloseHandle 273->286 287 2ca7342 273->287 274->258 281 2ca73bf-2ca73e3 call 2cb4b00 call 2ca439c 274->281 278 2ca7399-2ca739b 275->278 279 2ca739d-2ca73aa call 2ca53ec 275->279 278->274 279->274 281->258 296 2ca73e9-2ca7417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb234c 281->296 286->272 291 2ca7346-2ca736c InternetReadFile 287->291 292 2ca736e-2ca7375 291->292 293 2ca7377-2ca737e InternetCloseHandle 291->293 292->291 293->286 299 2ca7419-2ca742b call 2cb234c 296->299 300 2ca746d-2ca7488 call 2cb234c 296->300 299->300 307 2ca742d-2ca743f call 2cb234c 299->307 305 2ca748e-2ca7490 300->305 306 2ca7742-2ca7754 call 2cb234c 300->306 305->306 308 2ca7496-2ca7548 call 2cb2fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb4b00 * 5 call 2ca439c * 2 305->308 315 2ca779d-2ca77af call 2cb234c 306->315 316 2ca7756-2ca7758 306->316 307->300 317 2ca7441-2ca7453 call 2cb234c 307->317 370 2ca754a-2ca754c 308->370 371 2ca7585 308->371 328 2ca77d0-2ca77e2 call 2cb234c 315->328 329 2ca77b1-2ca77bf call 2ca61f5 call 2ca6303 315->329 316->315 319 2ca775a-2ca7798 call 2cb4b00 RtlEnterCriticalSection RtlLeaveCriticalSection 316->319 317->300 330 2ca7455-2ca7467 call 2cb234c 317->330 319->258 339 2ca77e8-2ca77ea 328->339 340 2ca7b00-2ca7b12 call 2cb234c 328->340 346 2ca77c4-2ca77cb call 2ca640e 329->346 330->258 330->300 339->340 344 2ca77f0-2ca7807 call 2ca439c 339->344 340->258 352 2ca7b18-2ca7b46 call 2cb2fbc call 2cb4b00 call 2ca439c 340->352 344->258 356 2ca780d-2ca78db call 2cb2428 call 2ca1ba7 344->356 346->258 378 2ca7b48-2ca7b4a call 2ca534d 352->378 379 2ca7b4f-2ca7b56 call 2cb2f84 352->379 373 2ca78dd call 2ca143f 356->373 374 2ca78e2-2ca7903 RtlEnterCriticalSection 356->374 370->371 377 2ca754e-2ca7560 call 2cb234c 370->377 380 2ca7589-2ca75b7 call 2cb2fbc call 2cb4b00 call 2ca439c 371->380 373->374 375 2ca790f-2ca7973 RtlLeaveCriticalSection call 2ca3c67 call 2ca3d7e call 2ca8346 374->375 376 2ca7905-2ca790c 374->376 404 2ca7979-2ca79c1 call 2caa730 375->404 405 2ca7ae7-2ca7afb call 2ca900e 375->405 376->375 377->371 392 2ca7562-2ca7583 call 2ca439c 377->392 378->379 379->258 402 2ca75f8-2ca7601 call 2cb2f84 380->402 403 2ca75b9-2ca75c8 call 2cb35f6 380->403 392->380 414 2ca7738-2ca773b 402->414 415 2ca7607-2ca761f call 2cb3b5c 402->415 403->402 416 2ca75ca 403->416 417 2ca7ab1-2ca7ae2 call 2ca83f5 call 2ca33b2 404->417 418 2ca79c7-2ca79ce 404->418 405->258 414->306 427 2ca762b 415->427 428 2ca7621-2ca7629 call 2ca9742 415->428 420 2ca75cf-2ca75e1 call 2cb2860 416->420 417->405 422 2ca79d1-2ca79d6 418->422 435 2ca75e3 420->435 436 2ca75e6-2ca75f6 call 2cb35f6 420->436 422->422 426 2ca79d8-2ca7a23 call 2caa730 422->426 426->417 437 2ca7a29-2ca7a2f 426->437 434 2ca762d-2ca76cf call 2caa85a call 2ca3863 call 2ca5119 call 2ca3863 call 2caab00 call 2caac1a 427->434 428->434 459 2ca76d4-2ca76e5 434->459 435->436 436->402 436->420 441 2ca7a32-2ca7a37 437->441 441->441 444 2ca7a39-2ca7a74 call 2caa730 441->444 444->417 450 2ca7a76-2ca7aaa call 2cad122 444->450 454 2ca7aaf-2ca7ab0 450->454 454->417 460 2ca76ec-2ca7717 Sleep call 2cb1900 459->460 461 2ca76e7 call 2ca380b 459->461 465 2ca7719-2ca7722 call 2ca4100 460->465 466 2ca7723-2ca7731 460->466 461->460 465->466 466->414 468 2ca7733 call 2ca380b 466->468 468->414
                                                      APIs
                                                      • RtlInitializeCriticalSection.NTDLL(02CD71E0), ref: 02CA64BA
                                                      • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02CA64D1
                                                      • GetProcAddress.KERNEL32(00000000), ref: 02CA64DA
                                                      • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02CA64E9
                                                      • GetProcAddress.KERNEL32(00000000), ref: 02CA64EC
                                                      • GetTickCount.KERNEL32 ref: 02CA64F8
                                                        • Part of subcall function 02CA605A: _malloc.LIBCMT ref: 02CA6068
                                                      • GetVersionExA.KERNEL32(02CD7038), ref: 02CA6525
                                                      • _memset.LIBCMT ref: 02CA6544
                                                      • _malloc.LIBCMT ref: 02CA6551
                                                        • Part of subcall function 02CB2FBC: __FF_MSGBANNER.LIBCMT ref: 02CB2FD3
                                                        • Part of subcall function 02CB2FBC: __NMSG_WRITE.LIBCMT ref: 02CB2FDA
                                                        • Part of subcall function 02CB2FBC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02CB2FFF
                                                      • _malloc.LIBCMT ref: 02CA6561
                                                      • _malloc.LIBCMT ref: 02CA656C
                                                      • _malloc.LIBCMT ref: 02CA6577
                                                      • _malloc.LIBCMT ref: 02CA6582
                                                      • _malloc.LIBCMT ref: 02CA658D
                                                      • _malloc.LIBCMT ref: 02CA6598
                                                      • _malloc.LIBCMT ref: 02CA65A7
                                                      • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02CA65BE
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 02CA65C7
                                                      • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02CA65D6
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 02CA65D9
                                                      • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02CA65E4
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 02CA65E7
                                                      • _memset.LIBCMT ref: 02CA65FA
                                                      • _memset.LIBCMT ref: 02CA6606
                                                      • _memset.LIBCMT ref: 02CA6613
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA6621
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA662E
                                                      • _malloc.LIBCMT ref: 02CA6652
                                                      • _malloc.LIBCMT ref: 02CA6660
                                                      • _malloc.LIBCMT ref: 02CA6667
                                                      • _malloc.LIBCMT ref: 02CA668D
                                                      • QueryPerformanceCounter.KERNEL32(00000200), ref: 02CA66A0
                                                      • Sleep.KERNEL32 ref: 02CA66AE
                                                      • _malloc.LIBCMT ref: 02CA66BA
                                                      • _malloc.LIBCMT ref: 02CA66C7
                                                      • _memset.LIBCMT ref: 02CA66DC
                                                      • _memset.LIBCMT ref: 02CA66EC
                                                      • Sleep.KERNEL32(0000EA60), ref: 02CA6708
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA6713
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA6724
                                                      • _memset.LIBCMT ref: 02CA6779
                                                      • _memset.LIBCMT ref: 02CA6788
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                      • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                      • API String ID: 2251652938-2678694477
                                                      • Opcode ID: 297f9980d0590c914d144c395f1228b1f82aad266fd4041db2cbde3ef16b9850
                                                      • Instruction ID: d4ede0c027c5df884af48024897730edd3009e52a33cef8a4405e142a3b222d4
                                                      • Opcode Fuzzy Hash: 297f9980d0590c914d144c395f1228b1f82aad266fd4041db2cbde3ef16b9850
                                                      • Instruction Fuzzy Hash: 497190B1D483509FE7116B70AC49B5BBBE9AF45320F21092DFA8597381DBB49804CF96

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 789 401b4b-401b68 LoadLibraryA 790 401c21-401c25 789->790 791 401b6e-401b7f GetProcAddress 789->791 792 401b85-401b8e 791->792 793 401c18-401c1b FreeLibrary 791->793 794 401b95-401ba5 GetAdaptersInfo 792->794 793->790 795 401ba7-401bb0 794->795 796 401bdb-401be3 794->796 797 401bc1-401bd7 call 403030 call 4018cc 795->797 798 401bb2-401bb6 795->798 799 401be5-401beb call 403016 796->799 800 401bec-401bf0 796->800 797->796 798->796 801 401bb8-401bbf 798->801 799->800 804 401bf2-401bf6 800->804 805 401c15-401c17 800->805 801->797 801->798 804->805 808 401bf8-401bfb 804->808 805->793 810 401c06-401c13 call 403008 808->810 811 401bfd-401c03 808->811 810->794 810->805 811->810
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00401B5D
                                                      • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                      • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                      • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                      • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                      • API String ID: 514930453-3667123677
                                                      • Opcode ID: f6a3d4a546fe447aa090b4b337ce8e2c682d0eb15c8ca8dfe33d6ce67d69008a
                                                      • Instruction ID: a538f8a8679b9925356c4c7d9fe0bed0b0a0820a8f86c695c00da230608c3b9e
                                                      • Opcode Fuzzy Hash: f6a3d4a546fe447aa090b4b337ce8e2c682d0eb15c8ca8dfe33d6ce67d69008a
                                                      • Instruction Fuzzy Hash: FE21B870904209AEDF219FA5CD447EF7FB8EF45345F0440BAD604B22A1E7389E85CB69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1031 401f64-401f84 FindResourceA 1032 401f86-401f9d GetLastError SizeofResource 1031->1032 1033 401f9f-401fa1 1031->1033 1032->1033 1035 401fa6-401fec LoadResource LockResource GlobalAlloc call 402c70 * 2 1032->1035 1034 402096-40209a 1033->1034 1040 401fee-401ff9 1035->1040 1040->1040 1041 401ffb-402003 GetTickCount 1040->1041 1042 402032-402038 1041->1042 1043 402005-402007 1041->1043 1044 402053-402083 GlobalAlloc call 401c26 1042->1044 1046 40203a-40204a 1042->1046 1043->1044 1045 402009-40200f 1043->1045 1051 402088-402093 1044->1051 1045->1044 1050 402011-402023 1045->1050 1047 40204c 1046->1047 1048 40204e-402051 1046->1048 1047->1048 1048->1044 1048->1046 1052 402025 1050->1052 1053 402027-40202a 1050->1053 1051->1034 1052->1053 1053->1050 1054 40202c-40202e 1053->1054 1054->1045 1055 402030 1054->1055 1055->1044
                                                      APIs
                                                      • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                      • GetLastError.KERNEL32 ref: 00401F86
                                                      • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                      • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                      • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401FBF
                                                      • GetTickCount.KERNEL32 ref: 00401FFB
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00402061
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                      • String ID:
                                                      • API String ID: 564119183-0
                                                      • Opcode ID: 78592008841833dc4a3c491277643ee8c1760502768a05008f4964f6f4ca3acf
                                                      • Instruction ID: a77b5dbc41acd1841a8a8b39c887614a858c704a1153a2713047522ce7334443
                                                      • Opcode Fuzzy Hash: 78592008841833dc4a3c491277643ee8c1760502768a05008f4964f6f4ca3acf
                                                      • Instruction Fuzzy Hash: 61314C31A00355AFDB105FB99F889AF7F78EF45344B14807AFA86F7281DA748845C7A8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1079 2caf9b2-2caf9d5 LoadLibraryA 1080 2caf9db-2caf9e9 GetProcAddress 1079->1080 1081 2cafa95-2cafa9c 1079->1081 1082 2cafa8e-2cafa8f FreeLibrary 1080->1082 1083 2caf9ef-2caf9ff 1080->1083 1082->1081 1084 2cafa01-2cafa0d GetAdaptersInfo 1083->1084 1085 2cafa0f 1084->1085 1086 2cafa45-2cafa4d 1084->1086 1089 2cafa11-2cafa18 1085->1089 1087 2cafa4f-2cafa55 call 2cb37b8 1086->1087 1088 2cafa56-2cafa5b 1086->1088 1087->1088 1091 2cafa89-2cafa8d 1088->1091 1092 2cafa5d-2cafa60 1088->1092 1093 2cafa1a-2cafa1e 1089->1093 1094 2cafa22-2cafa2a 1089->1094 1091->1082 1092->1091 1096 2cafa62-2cafa67 1092->1096 1093->1089 1097 2cafa20 1093->1097 1098 2cafa2d-2cafa32 1094->1098 1099 2cafa69-2cafa71 1096->1099 1100 2cafa74-2cafa7f call 2cb3b5c 1096->1100 1097->1086 1098->1098 1101 2cafa34-2cafa41 call 2caf701 1098->1101 1099->1100 1100->1091 1106 2cafa81-2cafa84 1100->1106 1101->1086 1106->1084
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02CAF9C8
                                                      • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02CAF9E1
                                                      • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02CAFA06
                                                      • FreeLibrary.KERNEL32(00000000), ref: 02CAFA8F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                      • String ID: GetAdaptersInfo$iphlpapi.dll
                                                      • API String ID: 514930453-3114217049
                                                      • Opcode ID: d2d536fbf35e730070338b0c65de1569379a397d6f4486765691c6e80daf783d
                                                      • Instruction ID: c5beba9c08adc9e8682de380ff57ff74bbd3075abd4689cacf2522d059d4cc48
                                                      • Opcode Fuzzy Hash: d2d536fbf35e730070338b0c65de1569379a397d6f4486765691c6e80daf783d
                                                      • Instruction Fuzzy Hash: B321E671E4020A9FDB10CBA9D8946EEBBF8AF49318F1441BDD446E7611D7329E45CBA0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1164 2caf8ae-2caf8d9 CreateFileA 1165 2caf9aa-2caf9b1 1164->1165 1166 2caf8df-2caf8f4 1164->1166 1167 2caf8f7-2caf919 DeviceIoControl 1166->1167 1168 2caf91b-2caf923 1167->1168 1169 2caf952-2caf95a 1167->1169 1170 2caf92c-2caf931 1168->1170 1171 2caf925-2caf92a 1168->1171 1172 2caf95c-2caf962 call 2cb37b8 1169->1172 1173 2caf963-2caf965 1169->1173 1170->1169 1174 2caf933-2caf93b 1170->1174 1171->1169 1172->1173 1176 2caf9a0-2caf9a9 CloseHandle 1173->1176 1177 2caf967-2caf96a 1173->1177 1178 2caf93e-2caf943 1174->1178 1176->1165 1180 2caf96c-2caf975 GetLastError 1177->1180 1181 2caf986-2caf993 call 2cb3b5c 1177->1181 1178->1178 1184 2caf945-2caf951 call 2caf701 1178->1184 1180->1176 1182 2caf977-2caf97a 1180->1182 1181->1176 1188 2caf995-2caf99b 1181->1188 1182->1181 1185 2caf97c-2caf983 1182->1185 1184->1169 1185->1181 1188->1167
                                                      APIs
                                                      • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02CAF8CD
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02CAF90B
                                                      • GetLastError.KERNEL32 ref: 02CAF96C
                                                      • CloseHandle.KERNEL32(?), ref: 02CAF9A3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                      • String ID: \\.\PhysicalDrive0
                                                      • API String ID: 4026078076-1180397377
                                                      • Opcode ID: 855204fdd14e7f279b1ef8316d1225c4e06dd32550f9cc8ba9b0901ae6fc9dc6
                                                      • Instruction ID: 185b7b1cfbf662e0f91018032bab6fe8bce696de3b00a907e35784df5fc7d694
                                                      • Opcode Fuzzy Hash: 855204fdd14e7f279b1ef8316d1225c4e06dd32550f9cc8ba9b0901ae6fc9dc6
                                                      • Instruction Fuzzy Hash: 5331B071D0021ABBDB14DFA4C8A4BEEBBB8FF44718F20416DE515A3640D7715B05CB90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1190 401a4f-401a77 CreateFileA 1191 401b45-401b4a 1190->1191 1192 401a7d-401a91 1190->1192 1193 401a98-401ac0 DeviceIoControl 1192->1193 1194 401ac2-401aca 1193->1194 1195 401af3-401afb 1193->1195 1198 401ad4-401ad9 1194->1198 1199 401acc-401ad2 1194->1199 1196 401b04-401b07 1195->1196 1197 401afd-401b03 call 403016 1195->1197 1201 401b09-401b0c 1196->1201 1202 401b3a-401b44 CloseHandle 1196->1202 1197->1196 1198->1195 1203 401adb-401af1 call 403030 call 4018cc 1198->1203 1199->1195 1206 401b27-401b34 call 403008 1201->1206 1207 401b0e-401b17 GetLastError 1201->1207 1202->1191 1203->1195 1206->1193 1206->1202 1207->1202 1209 401b19-401b1c 1207->1209 1209->1206 1212 401b1e-401b24 1209->1212 1212->1206
                                                      APIs
                                                      • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                      • DeviceIoControl.KERNEL32(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                      • GetLastError.KERNEL32 ref: 00401B0E
                                                      • CloseHandle.KERNEL32(?), ref: 00401B3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                      • String ID: \\.\PhysicalDrive0
                                                      • API String ID: 4026078076-1180397377
                                                      • Opcode ID: 5615ba990f0fe275dea84333be7d18dea40f1744691db02839f26b648948e018
                                                      • Instruction ID: 910dc0847f28e8ee35b02998416bdc4b897413fb4d2ac8f8b115ff7a722f769f
                                                      • Opcode Fuzzy Hash: 5615ba990f0fe275dea84333be7d18dea40f1744691db02839f26b648948e018
                                                      • Instruction Fuzzy Hash: D3316D71D01118EACB21AF95CD809EFBBB9FF45750F20407AE554B22A0E7785E45CB98

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02CA1D11
                                                      • GetLastError.KERNEL32 ref: 02CA1D23
                                                        • Part of subcall function 02CA1712: __EH_prolog.LIBCMT ref: 02CA1717
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02CA1D59
                                                      • GetLastError.KERNEL32 ref: 02CA1D6B
                                                      • __beginthreadex.LIBCMT ref: 02CA1DB1
                                                      • GetLastError.KERNEL32 ref: 02CA1DC6
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CA1DDD
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CA1DEC
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02CA1E14
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CA1E1B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                      • String ID: thread$thread.entry_event$thread.exit_event
                                                      • API String ID: 831262434-3017686385
                                                      • Opcode ID: 55e1779e31ae64aabd9439915c556628784268842f022c925abf1f1e8c6edeb6
                                                      • Instruction ID: 6c8cb1546bd502aa5522169b3fe03340706265c031c1f755ba9fe58fa31bce5a
                                                      • Opcode Fuzzy Hash: 55e1779e31ae64aabd9439915c556628784268842f022c925abf1f1e8c6edeb6
                                                      • Instruction Fuzzy Hash: 43317C719003019FD701EF20C858B6BBBA9EF84728F24496DF9598B290DBB09D49CFD2

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA4D8B
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA4DB7
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA4DC3
                                                        • Part of subcall function 02CA4BED: __EH_prolog.LIBCMT ref: 02CA4BF2
                                                        • Part of subcall function 02CA4BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02CA4CF2
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA4E93
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA4E99
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA4EA0
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA4EA6
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA50A7
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA50AD
                                                      • RtlEnterCriticalSection.NTDLL(02CD71E0), ref: 02CA50B8
                                                      • RtlLeaveCriticalSection.NTDLL(02CD71E0), ref: 02CA50C1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                      • String ID:
                                                      • API String ID: 2062355503-0
                                                      • Opcode ID: d9f77869c49282a0bd25c186f6c8075986ec0636c7f834ad26e39b457c8c9541
                                                      • Instruction ID: 2b2ae246907ebccc8ec10730240c1db6888f4513cd4478926b785b74423741d9
                                                      • Opcode Fuzzy Hash: d9f77869c49282a0bd25c186f6c8075986ec0636c7f834ad26e39b457c8c9541
                                                      • Instruction Fuzzy Hash: 5BB17E71D0025EDFEF25DFA0C854BEEBBB9AF04318F20419AE505B6280DBB45A49CF91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 572 2ca7bb1-2ca7bb6 573 2ca7bb8-2ca7bf7 572->573 574 2ca7b39-2ca7b46 572->574 576 2ca7b48-2ca7b4a call 2ca534d 574->576 577 2ca7b4f-2ca7b56 call 2cb2f84 574->577 576->577 581 2ca66f4-2ca66f6 577->581 582 2ca66f8-2ca66fd 581->582 583 2ca66ff-2ca6701 581->583 586 2ca6708 Sleep 582->586 584 2ca670e-2ca6742 RtlEnterCriticalSection RtlLeaveCriticalSection 583->584 585 2ca6703 583->585 587 2ca6792 584->587 588 2ca6744-2ca6750 584->588 585->586 586->584 590 2ca6796-2ca72c3 InternetOpenA 587->590 588->587 589 2ca6752-2ca675f 588->589 591 2ca6761-2ca6765 589->591 592 2ca6767-2ca6768 589->592 595 2ca7389-2ca738f 590->595 596 2ca72c9-2ca7340 InternetSetOptionA * 3 call 2cb4b00 InternetOpenUrlA 590->596 594 2ca676c-2ca6790 call 2cb4b00 * 2 591->594 592->594 594->590 597 2ca73ab-2ca73b9 595->597 598 2ca7391-2ca7397 595->598 609 2ca7382-2ca7383 InternetCloseHandle 596->609 610 2ca7342 596->610 597->581 604 2ca73bf-2ca73e3 call 2cb4b00 call 2ca439c 597->604 601 2ca7399-2ca739b 598->601 602 2ca739d-2ca73aa call 2ca53ec 598->602 601->597 602->597 604->581 619 2ca73e9-2ca7417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb234c 604->619 609->595 614 2ca7346-2ca736c InternetReadFile 610->614 615 2ca736e-2ca7375 614->615 616 2ca7377-2ca737e InternetCloseHandle 614->616 615->614 616->609 622 2ca7419-2ca742b call 2cb234c 619->622 623 2ca746d-2ca7488 call 2cb234c 619->623 622->623 630 2ca742d-2ca743f call 2cb234c 622->630 628 2ca748e-2ca7490 623->628 629 2ca7742-2ca7754 call 2cb234c 623->629 628->629 631 2ca7496-2ca7548 call 2cb2fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb4b00 * 5 call 2ca439c * 2 628->631 638 2ca779d-2ca77af call 2cb234c 629->638 639 2ca7756-2ca7758 629->639 630->623 640 2ca7441-2ca7453 call 2cb234c 630->640 693 2ca754a-2ca754c 631->693 694 2ca7585 631->694 651 2ca77d0-2ca77e2 call 2cb234c 638->651 652 2ca77b1-2ca77bf call 2ca61f5 call 2ca6303 638->652 639->638 642 2ca775a-2ca7798 call 2cb4b00 RtlEnterCriticalSection RtlLeaveCriticalSection 639->642 640->623 653 2ca7455-2ca7467 call 2cb234c 640->653 642->581 662 2ca77e8-2ca77ea 651->662 663 2ca7b00-2ca7b12 call 2cb234c 651->663 669 2ca77c4-2ca77cb call 2ca640e 652->669 653->581 653->623 662->663 667 2ca77f0-2ca7807 call 2ca439c 662->667 663->581 675 2ca7b18-2ca7b46 call 2cb2fbc call 2cb4b00 call 2ca439c 663->675 667->581 679 2ca780d-2ca78db call 2cb2428 call 2ca1ba7 667->679 669->581 675->576 675->577 696 2ca78dd call 2ca143f 679->696 697 2ca78e2-2ca7903 RtlEnterCriticalSection 679->697 693->694 700 2ca754e-2ca7560 call 2cb234c 693->700 701 2ca7589-2ca75b7 call 2cb2fbc call 2cb4b00 call 2ca439c 694->701 696->697 698 2ca790f-2ca7973 RtlLeaveCriticalSection call 2ca3c67 call 2ca3d7e call 2ca8346 697->698 699 2ca7905-2ca790c 697->699 722 2ca7979-2ca79c1 call 2caa730 698->722 723 2ca7ae7-2ca7afb call 2ca900e 698->723 699->698 700->694 710 2ca7562-2ca7583 call 2ca439c 700->710 720 2ca75f8-2ca7601 call 2cb2f84 701->720 721 2ca75b9-2ca75c8 call 2cb35f6 701->721 710->701 732 2ca7738-2ca773b 720->732 733 2ca7607-2ca761f call 2cb3b5c 720->733 721->720 734 2ca75ca 721->734 735 2ca7ab1-2ca7ae2 call 2ca83f5 call 2ca33b2 722->735 736 2ca79c7-2ca79ce 722->736 723->581 732->629 745 2ca762b 733->745 746 2ca7621-2ca7629 call 2ca9742 733->746 738 2ca75cf-2ca75e1 call 2cb2860 734->738 735->723 740 2ca79d1-2ca79d6 736->740 753 2ca75e3 738->753 754 2ca75e6-2ca75f6 call 2cb35f6 738->754 740->740 744 2ca79d8-2ca7a23 call 2caa730 740->744 744->735 755 2ca7a29-2ca7a2f 744->755 752 2ca762d-2ca76cf call 2caa85a call 2ca3863 call 2ca5119 call 2ca3863 call 2caab00 call 2caac1a 745->752 746->752 777 2ca76d4-2ca76e5 752->777 753->754 754->720 754->738 759 2ca7a32-2ca7a37 755->759 759->759 762 2ca7a39-2ca7a74 call 2caa730 759->762 762->735 768 2ca7a76-2ca7aaa call 2cad122 762->768 772 2ca7aaf-2ca7ab0 768->772 772->735 778 2ca76ec-2ca7717 Sleep call 2cb1900 777->778 779 2ca76e7 call 2ca380b 777->779 783 2ca7719-2ca7722 call 2ca4100 778->783 784 2ca7723-2ca7731 778->784 779->778 783->784 784->732 786 2ca7733 call 2ca380b 784->786 786->732
                                                      APIs
                                                      Strings
                                                      • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02CA6739
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection_memset$EnterLeaveSleep_free
                                                      • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                      • API String ID: 1317429769-1923541051
                                                      • Opcode ID: aa7c9d5cee6dc7295578b5448bfc2591a5657f4e59e6c1e9557640013f10fc67
                                                      • Instruction ID: 82ed1dd10cff2865459a4c36544848d93ffa2581f9de71c6906dfa2c99b4b56f
                                                      • Opcode Fuzzy Hash: aa7c9d5cee6dc7295578b5448bfc2591a5657f4e59e6c1e9557640013f10fc67
                                                      • Instruction Fuzzy Hash: FA21AD76918342DBD711DF60AC2174AFBE5FF86324F684C68F5919B241D7705845CB82

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 815 2ca7b9b-2ca7ba0 816 2ca7ba2-2ca7ba9 815->816 817 2ca7b40-2ca7b46 815->817 818 2ca7b48-2ca7b4a call 2ca534d 817->818 819 2ca7b4f-2ca7b56 call 2cb2f84 817->819 818->819 823 2ca66f4-2ca66f6 819->823 824 2ca66f8-2ca66fd 823->824 825 2ca66ff-2ca6701 823->825 828 2ca6708 Sleep 824->828 826 2ca670e-2ca6742 RtlEnterCriticalSection RtlLeaveCriticalSection 825->826 827 2ca6703 825->827 829 2ca6792 826->829 830 2ca6744-2ca6750 826->830 827->828 828->826 832 2ca6796-2ca72c3 InternetOpenA 829->832 830->829 831 2ca6752-2ca675f 830->831 833 2ca6761-2ca6765 831->833 834 2ca6767-2ca6768 831->834 837 2ca7389-2ca738f 832->837 838 2ca72c9-2ca7340 InternetSetOptionA * 3 call 2cb4b00 InternetOpenUrlA 832->838 836 2ca676c-2ca6790 call 2cb4b00 * 2 833->836 834->836 836->832 839 2ca73ab-2ca73b9 837->839 840 2ca7391-2ca7397 837->840 851 2ca7382-2ca7383 InternetCloseHandle 838->851 852 2ca7342 838->852 839->823 846 2ca73bf-2ca73e3 call 2cb4b00 call 2ca439c 839->846 843 2ca7399-2ca739b 840->843 844 2ca739d-2ca73aa call 2ca53ec 840->844 843->839 844->839 846->823 861 2ca73e9-2ca7417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb234c 846->861 851->837 856 2ca7346-2ca736c InternetReadFile 852->856 857 2ca736e-2ca7375 856->857 858 2ca7377-2ca737e InternetCloseHandle 856->858 857->856 858->851 864 2ca7419-2ca742b call 2cb234c 861->864 865 2ca746d-2ca7488 call 2cb234c 861->865 864->865 872 2ca742d-2ca743f call 2cb234c 864->872 870 2ca748e-2ca7490 865->870 871 2ca7742-2ca7754 call 2cb234c 865->871 870->871 873 2ca7496-2ca7548 call 2cb2fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2cb4b00 * 5 call 2ca439c * 2 870->873 880 2ca779d-2ca77af call 2cb234c 871->880 881 2ca7756-2ca7758 871->881 872->865 882 2ca7441-2ca7453 call 2cb234c 872->882 935 2ca754a-2ca754c 873->935 936 2ca7585 873->936 893 2ca77d0-2ca77e2 call 2cb234c 880->893 894 2ca77b1-2ca77cb call 2ca61f5 call 2ca6303 call 2ca640e 880->894 881->880 884 2ca775a-2ca7798 call 2cb4b00 RtlEnterCriticalSection RtlLeaveCriticalSection 881->884 882->865 895 2ca7455-2ca7467 call 2cb234c 882->895 884->823 904 2ca77e8-2ca77ea 893->904 905 2ca7b00-2ca7b12 call 2cb234c 893->905 894->823 895->823 895->865 904->905 909 2ca77f0-2ca7807 call 2ca439c 904->909 905->823 917 2ca7b18-2ca7b46 call 2cb2fbc call 2cb4b00 call 2ca439c 905->917 909->823 921 2ca780d-2ca78db call 2cb2428 call 2ca1ba7 909->921 917->818 917->819 938 2ca78dd call 2ca143f 921->938 939 2ca78e2-2ca7903 RtlEnterCriticalSection 921->939 935->936 942 2ca754e-2ca7560 call 2cb234c 935->942 943 2ca7589-2ca75b7 call 2cb2fbc call 2cb4b00 call 2ca439c 936->943 938->939 940 2ca790f-2ca7973 RtlLeaveCriticalSection call 2ca3c67 call 2ca3d7e call 2ca8346 939->940 941 2ca7905-2ca790c 939->941 964 2ca7979-2ca79c1 call 2caa730 940->964 965 2ca7ae7-2ca7afb call 2ca900e 940->965 941->940 942->936 952 2ca7562-2ca7583 call 2ca439c 942->952 962 2ca75f8-2ca7601 call 2cb2f84 943->962 963 2ca75b9-2ca75c8 call 2cb35f6 943->963 952->943 974 2ca7738-2ca773b 962->974 975 2ca7607-2ca761f call 2cb3b5c 962->975 963->962 976 2ca75ca 963->976 977 2ca7ab1-2ca7ae2 call 2ca83f5 call 2ca33b2 964->977 978 2ca79c7-2ca79ce 964->978 965->823 974->871 987 2ca762b 975->987 988 2ca7621-2ca7629 call 2ca9742 975->988 980 2ca75cf-2ca75e1 call 2cb2860 976->980 977->965 982 2ca79d1-2ca79d6 978->982 995 2ca75e3 980->995 996 2ca75e6-2ca75f6 call 2cb35f6 980->996 982->982 986 2ca79d8-2ca7a23 call 2caa730 982->986 986->977 997 2ca7a29-2ca7a2f 986->997 994 2ca762d-2ca76e5 call 2caa85a call 2ca3863 call 2ca5119 call 2ca3863 call 2caab00 call 2caac1a 987->994 988->994 1020 2ca76ec-2ca7717 Sleep call 2cb1900 994->1020 1021 2ca76e7 call 2ca380b 994->1021 995->996 996->962 996->980 1001 2ca7a32-2ca7a37 997->1001 1001->1001 1004 2ca7a39-2ca7a74 call 2caa730 1001->1004 1004->977 1010 2ca7a76-2ca7ab0 call 2cad122 1004->1010 1010->977 1025 2ca7719-2ca7722 call 2ca4100 1020->1025 1026 2ca7723-2ca7731 1020->1026 1021->1020 1025->1026 1026->974 1028 2ca7733 call 2ca380b 1026->1028 1028->974
                                                      APIs
                                                      Strings
                                                      • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02CA6739
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection_memset$EnterLeaveSleep_free
                                                      • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                      • API String ID: 1317429769-1923541051
                                                      • Opcode ID: b386e65ea99d85f08876ccc365068d2380ce9e4da098447cbdb024f11d4a3bac
                                                      • Instruction ID: 9d92f0de47251e393d65ff0ee4e33e9d52c92bf4cdc18ce9bafdabffa65d542f
                                                      • Opcode Fuzzy Hash: b386e65ea99d85f08876ccc365068d2380ce9e4da098447cbdb024f11d4a3bac
                                                      • Instruction Fuzzy Hash: 57115C75D283029FDB11AF24AC2475FBBE9BF85769F340824F581DB240DB719904CB82

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1056 2ca26db-2ca2726 RtlEnterCriticalSection 1057 2ca2728-2ca2736 CreateWaitableTimerA 1056->1057 1058 2ca277e-2ca2781 1056->1058 1059 2ca275b-2ca2778 SetWaitableTimer 1057->1059 1060 2ca2738-2ca2756 GetLastError call 2cb0b20 call 2ca1712 1057->1060 1061 2ca2783-2ca2798 call 2cb3b5c 1058->1061 1062 2ca27d5-2ca27f0 RtlLeaveCriticalSection 1058->1062 1059->1058 1060->1059 1067 2ca27ca 1061->1067 1068 2ca279a-2ca27ac call 2cb3b5c 1061->1068 1071 2ca27cc-2ca27d0 call 2ca7e0e 1067->1071 1074 2ca27b9 1068->1074 1075 2ca27ae-2ca27b7 1068->1075 1071->1062 1076 2ca27bb-2ca27c3 call 2ca1cf8 1074->1076 1075->1076 1078 2ca27c8 1076->1078 1078->1071
                                                      APIs
                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 02CA2706
                                                      • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02CA272B
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02CC5B63), ref: 02CA2738
                                                        • Part of subcall function 02CA1712: __EH_prolog.LIBCMT ref: 02CA1717
                                                      • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02CA2778
                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 02CA27D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                      • String ID: timer
                                                      • API String ID: 4293676635-1792073242
                                                      • Opcode ID: 9171b4826a5e34705d543f88acb66ecac9df92b622c9259bb076d67dde858c84
                                                      • Instruction ID: f53e887dcca59129ec203c5ddf243ffeeb2ba5e3fb32ea90b9f221be1813414f
                                                      • Opcode Fuzzy Hash: 9171b4826a5e34705d543f88acb66ecac9df92b622c9259bb076d67dde858c84
                                                      • Instruction Fuzzy Hash: 8B319CB1904716AFD310DF25C994B56BBE8FB48728F104A2EF859C3680D770EA14CFA6

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1107 2ca2b95-2ca2baf 1108 2ca2bb1-2ca2bb9 call 2cb0b20 1107->1108 1109 2ca2bc7-2ca2bcb 1107->1109 1116 2ca2bbf-2ca2bc2 1108->1116 1111 2ca2bdf 1109->1111 1112 2ca2bcd-2ca2bd0 1109->1112 1115 2ca2be2-2ca2c11 WSASetLastError WSARecv call 2caa514 1111->1115 1112->1111 1114 2ca2bd2-2ca2bdd call 2cb0b20 1112->1114 1114->1116 1121 2ca2c16-2ca2c1d 1115->1121 1119 2ca2d30 1116->1119 1124 2ca2d32-2ca2d38 1119->1124 1122 2ca2c1f-2ca2c2a call 2cb0b20 1121->1122 1123 2ca2c2c-2ca2c32 1121->1123 1132 2ca2c3f-2ca2c42 1122->1132 1126 2ca2c46-2ca2c48 1123->1126 1127 2ca2c34-2ca2c39 call 2cb0b20 1123->1127 1130 2ca2c4a-2ca2c4d 1126->1130 1131 2ca2c4f-2ca2c60 call 2cb0b20 1126->1131 1127->1132 1134 2ca2c66-2ca2c69 1130->1134 1131->1124 1131->1134 1132->1126 1137 2ca2c6b-2ca2c6d 1134->1137 1138 2ca2c73-2ca2c76 1134->1138 1137->1138 1140 2ca2d22-2ca2d2d call 2ca1996 1137->1140 1138->1119 1139 2ca2c7c-2ca2c9a call 2cb0b20 call 2ca166f 1138->1139 1147 2ca2cbc-2ca2cfa WSASetLastError select call 2caa514 1139->1147 1148 2ca2c9c-2ca2cba call 2cb0b20 call 2ca166f 1139->1148 1140->1119 1154 2ca2d08 1147->1154 1155 2ca2cfc-2ca2d06 call 2cb0b20 1147->1155 1148->1119 1148->1147 1156 2ca2d0a-2ca2d12 call 2cb0b20 1154->1156 1157 2ca2d15-2ca2d17 1154->1157 1161 2ca2d19-2ca2d1d 1155->1161 1156->1157 1157->1119 1157->1161 1161->1115
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA2BE4
                                                      • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02CA2C07
                                                        • Part of subcall function 02CAA514: WSAGetLastError.WS2_32(00000000,?,?,02CA2A51), ref: 02CAA522
                                                      • WSASetLastError.WS2_32 ref: 02CA2CD3
                                                      • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02CA2CE7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$Recvselect
                                                      • String ID: 3'
                                                      • API String ID: 886190287-280543908
                                                      • Opcode ID: de9edd950130869296a73467c9851a61ac0a6cf6ff2c2c62efc80bae018bebd3
                                                      • Instruction ID: 6df783d5722c8df2cd0d3ff8fb15786b47c3854bd529b97f4aad4cd18d2e3520
                                                      • Opcode Fuzzy Hash: de9edd950130869296a73467c9851a61ac0a6cf6ff2c2c62efc80bae018bebd3
                                                      • Instruction Fuzzy Hash: F7416CB19153128FDB119F74D4247ABBBE9AF8836CF10091EE899C7281EB74D540CFA2

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1215 2ca29ee-2ca2a06 1216 2ca2a0c-2ca2a10 1215->1216 1217 2ca2ab3-2ca2abb call 2cb0b20 1215->1217 1219 2ca2a39-2ca2a4c WSASetLastError closesocket call 2caa514 1216->1219 1220 2ca2a12-2ca2a15 1216->1220 1224 2ca2abe-2ca2ac6 1217->1224 1225 2ca2a51-2ca2a55 1219->1225 1220->1219 1223 2ca2a17-2ca2a36 call 2cb0b20 call 2ca2f50 1220->1223 1223->1219 1225->1217 1228 2ca2a57-2ca2a5f call 2cb0b20 1225->1228 1233 2ca2a69-2ca2a71 call 2cb0b20 1228->1233 1234 2ca2a61-2ca2a67 1228->1234 1240 2ca2aaf-2ca2ab1 1233->1240 1241 2ca2a73-2ca2a79 1233->1241 1234->1233 1235 2ca2a7b-2ca2aad ioctlsocket WSASetLastError closesocket call 2caa514 1234->1235 1235->1240 1240->1217 1240->1224 1241->1235 1241->1240
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA2A3B
                                                      • closesocket.WS2_32 ref: 02CA2A42
                                                      • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02CA2A89
                                                      • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02CA2A97
                                                      • closesocket.WS2_32 ref: 02CA2A9E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastclosesocket$ioctlsocket
                                                      • String ID:
                                                      • API String ID: 1561005644-0
                                                      • Opcode ID: 70755399876f03b04d03f93fb7d620cbbb81930d87f8608199d3bd212a70d042
                                                      • Instruction ID: 9b19aaa463aea581c0d05901a12934019eaf93f219788d7df330540c3ba09c19
                                                      • Opcode Fuzzy Hash: 70755399876f03b04d03f93fb7d620cbbb81930d87f8608199d3bd212a70d042
                                                      • Instruction Fuzzy Hash: 5D2128B1E40216ABEB20AFB8D91476AB7FDDF84319F104569E816C3241EB70CE44CF62

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1242 2ca1ba7-2ca1bcf call 2cc5400 RtlEnterCriticalSection 1245 2ca1be9-2ca1bf7 RtlLeaveCriticalSection call 2cae33b 1242->1245 1246 2ca1bd1 1242->1246 1249 2ca1bfa-2ca1c20 RtlEnterCriticalSection 1245->1249 1247 2ca1bd4-2ca1be0 call 2ca1b79 1246->1247 1254 2ca1be2-2ca1be7 1247->1254 1255 2ca1c55-2ca1c6e RtlLeaveCriticalSection 1247->1255 1251 2ca1c34-2ca1c36 1249->1251 1252 2ca1c38-2ca1c43 1251->1252 1253 2ca1c22-2ca1c2f call 2ca1b79 1251->1253 1256 2ca1c45-2ca1c4b 1252->1256 1253->1256 1260 2ca1c31 1253->1260 1254->1245 1254->1247 1256->1255 1259 2ca1c4d-2ca1c51 1256->1259 1259->1255 1260->1251
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA1BAC
                                                      • RtlEnterCriticalSection.NTDLL ref: 02CA1BBC
                                                      • RtlLeaveCriticalSection.NTDLL ref: 02CA1BEA
                                                      • RtlEnterCriticalSection.NTDLL ref: 02CA1C13
                                                      • RtlLeaveCriticalSection.NTDLL ref: 02CA1C56
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$H_prolog
                                                      • String ID:
                                                      • API String ID: 1633115879-0
                                                      • Opcode ID: c9dd83b60008ae8025283de31bbe1dca25f0d5afe6689617092ac7b4008efa71
                                                      • Instruction ID: d27e77cccbc1f7c2516ab58bad186aed0537898159a7b09b9151e0dee1354491
                                                      • Opcode Fuzzy Hash: c9dd83b60008ae8025283de31bbe1dca25f0d5afe6689617092ac7b4008efa71
                                                      • Instruction Fuzzy Hash: A4219FB5900605DFCB14CF68D44479ABBB9FF88728F248589E81997301DBB5EA05CBE0
                                                      APIs
                                                      • GetVersion.KERNEL32 ref: 00403246
                                                        • Part of subcall function 00404364: HeapCreate.KERNEL32(00000000,00001000,00000000,0040327F,00000000), ref: 00404375
                                                        • Part of subcall function 00404364: HeapDestroy.KERNEL32 ref: 004043B4
                                                      • GetCommandLineA.KERNEL32 ref: 00403294
                                                      • GetStartupInfoA.KERNEL32(?), ref: 004032BF
                                                      • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004032E2
                                                        • Part of subcall function 0040333B: ExitProcess.KERNEL32 ref: 00403358
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                      • String ID:
                                                      • API String ID: 2057626494-0
                                                      • Opcode ID: ab28d1ead4697ed0d8dd1c3572748f90fc29903a5067a4b5a40eff7935f6e0da
                                                      • Instruction ID: 857b842065bf28b810435c534a482318c0b7424de258d9d1d87b7a07579afd78
                                                      • Opcode Fuzzy Hash: ab28d1ead4697ed0d8dd1c3572748f90fc29903a5067a4b5a40eff7935f6e0da
                                                      • Instruction Fuzzy Hash: BC214CB1900A15AAD708EFA6DE8AA6E7FA8EB44705F10413EF505B72D2DB385500CB58
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA2EEE
                                                      • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02CA2EFD
                                                      • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02CA2F0C
                                                      • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02CA2F36
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$Socketsetsockopt
                                                      • String ID:
                                                      • API String ID: 2093263913-0
                                                      • Opcode ID: fd8978a221bf098f4c4c0e149e042d6f80c5514b9b465c6e6571a58bb4708377
                                                      • Instruction ID: b48bbe2884c7fd303f394ca5dd5f4761c00bdbcca1c0d733a1a5d7fb5f8cdfdb
                                                      • Opcode Fuzzy Hash: fd8978a221bf098f4c4c0e149e042d6f80c5514b9b465c6e6571a58bb4708377
                                                      • Instruction Fuzzy Hash: 02017171A50214BBDB209F65DC88B9BBBADEF89771F008569F918CB181D771C9008BA1
                                                      APIs
                                                        • Part of subcall function 02CA2D39: WSASetLastError.WS2_32(00000000), ref: 02CA2D47
                                                        • Part of subcall function 02CA2D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02CA2D5C
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA2E6D
                                                      • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02CA2E83
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$Sendselect
                                                      • String ID: 3'
                                                      • API String ID: 2958345159-280543908
                                                      • Opcode ID: f554c515f06659872873e7917d3f34f86be2893debe65bb08ae5dd2c090686f2
                                                      • Instruction ID: 7deee6caddfe251f2d340fbfa18e2723494326cf5b1e19929d92cc359794b55a
                                                      • Opcode Fuzzy Hash: f554c515f06659872873e7917d3f34f86be2893debe65bb08ae5dd2c090686f2
                                                      • Instruction Fuzzy Hash: E431ADB0E1122A9FDF11DF64C8247EEBBAAAF4831CF00455ADC0497281E774D595DFA1
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA2AEA
                                                      • connect.WS2_32(?,?,?), ref: 02CA2AF5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastconnect
                                                      • String ID: 3'
                                                      • API String ID: 374722065-280543908
                                                      • Opcode ID: fb758dba16fd922f39e7662e57cab34a7df487899424c815ddefc30e67f6b66a
                                                      • Instruction ID: d7f0f8253f028010c3594205d97a7f43812955eee3f69692b0d6d067d0416768
                                                      • Opcode Fuzzy Hash: fb758dba16fd922f39e7662e57cab34a7df487899424c815ddefc30e67f6b66a
                                                      • Instruction Fuzzy Hash: F421DB70E10215ABCF14EFB4D4246EEBBBAEF84328F104599DC1997380EB748A059F91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 27181ad8ede4cc0a77551f9aa45ff9afa439a866a45b6532e5da523539b5a962
                                                      • Instruction ID: fa0962caeff7110fe82c3714b4b2333ae74508e65526cea24b2fbd0d20547d5e
                                                      • Opcode Fuzzy Hash: 27181ad8ede4cc0a77551f9aa45ff9afa439a866a45b6532e5da523539b5a962
                                                      • Instruction Fuzzy Hash: 87515EB1904256DFCB05CF68C5656AABBF1FF48324F14819EE8299B380D774EA10CFA1
                                                      APIs
                                                      • InterlockedIncrement.KERNEL32(?), ref: 02CA36A7
                                                        • Part of subcall function 02CA2420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02CA2432
                                                        • Part of subcall function 02CA2420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02CA2445
                                                        • Part of subcall function 02CA2420: RtlEnterCriticalSection.NTDLL(?), ref: 02CA2454
                                                        • Part of subcall function 02CA2420: InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2469
                                                        • Part of subcall function 02CA2420: RtlLeaveCriticalSection.NTDLL(?), ref: 02CA2470
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 1601054111-0
                                                      • Opcode ID: ecf1de5177066ee16dd7ff84c453020ba6dceb1e2e2b28a9d77d47d9e2d31023
                                                      • Instruction ID: a5c40857c56f7a6d17a588d4cb9fac2a472147c7814d3d49a455a983515faa09
                                                      • Opcode Fuzzy Hash: ecf1de5177066ee16dd7ff84c453020ba6dceb1e2e2b28a9d77d47d9e2d31023
                                                      • Instruction Fuzzy Hash: BE11C1B510024AABDB218E58DCA5FAA3B6AFF40358F104556FD56CB290CB34D960CF94
                                                      APIs
                                                      • __beginthreadex.LIBCMT ref: 02CB2116
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02CAA994,00000000), ref: 02CB2147
                                                      • ResumeThread.KERNEL32(?,?,?,?,?,00000002,02CAA994,00000000), ref: 02CB2155
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleResumeThread__beginthreadex
                                                      • String ID:
                                                      • API String ID: 1685284544-0
                                                      • Opcode ID: c0eab96b3cdfdebdc797ca91327717667469b87739d8c361264c6d8b5ee00871
                                                      • Instruction ID: 93d0383a46c09a13c99e37b7de37c2e15466969a0594229a81abb32216aee697
                                                      • Opcode Fuzzy Hash: c0eab96b3cdfdebdc797ca91327717667469b87739d8c361264c6d8b5ee00871
                                                      • Instruction Fuzzy Hash: 61F06271240201ABEB219E6CDC84FD5B3E8EF88725F24056AF659D7290C771AC929F90
                                                      APIs
                                                      • InterlockedIncrement.KERNEL32(02CD72B4), ref: 02CA1ABA
                                                      • WSAStartup.WS2_32(00000002,00000000), ref: 02CA1ACB
                                                      • InterlockedExchange.KERNEL32(02CD72B8,00000000), ref: 02CA1AD7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked$ExchangeIncrementStartup
                                                      • String ID:
                                                      • API String ID: 1856147945-0
                                                      • Opcode ID: 119507b9de88c90822369e784c77d682c65e9c21a0c5e3d68d1f482bd3df7018
                                                      • Instruction ID: afb35d80c25878c01c68a36dc032fb0dc69a898412bb279f4f0109983aaa4195
                                                      • Opcode Fuzzy Hash: 119507b9de88c90822369e784c77d682c65e9c21a0c5e3d68d1f482bd3df7018
                                                      • Instruction Fuzzy Hash: 07D05E319906159BE21066A4AC4EB78F72CE705625F100761FDAEC01C4EA615A288AF6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: {@l
                                                      • API String ID: 0-3718582573
                                                      • Opcode ID: cbaad41fd8e55e6bf486052d915d0f64d8905e30713b4f609a466d20302c21e1
                                                      • Instruction ID: ae2212b325bd57fe7e20974c9317aa65f0889f95986f95f6bef1ef88e6bca878
                                                      • Opcode Fuzzy Hash: cbaad41fd8e55e6bf486052d915d0f64d8905e30713b4f609a466d20302c21e1
                                                      • Instruction Fuzzy Hash: 1111C07A9086578BC711CFB0C9005EA7F65AB51360B18457FD8C1BB5E2C735940AC79A
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA4BF2
                                                        • Part of subcall function 02CA1BA7: __EH_prolog.LIBCMT ref: 02CA1BAC
                                                        • Part of subcall function 02CA1BA7: RtlEnterCriticalSection.NTDLL ref: 02CA1BBC
                                                        • Part of subcall function 02CA1BA7: RtlLeaveCriticalSection.NTDLL ref: 02CA1BEA
                                                        • Part of subcall function 02CA1BA7: RtlEnterCriticalSection.NTDLL ref: 02CA1C13
                                                        • Part of subcall function 02CA1BA7: RtlLeaveCriticalSection.NTDLL ref: 02CA1C56
                                                        • Part of subcall function 02CAE103: __EH_prolog.LIBCMT ref: 02CAE108
                                                        • Part of subcall function 02CAE103: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CAE187
                                                      • InterlockedExchange.KERNEL32(?,00000000), ref: 02CA4CF2
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                      • String ID:
                                                      • API String ID: 1927618982-0
                                                      • Opcode ID: 0bb2224589e865e03c985b9c1812ac0c5239fdf46fb2e2b527489ce6b06a742a
                                                      • Instruction ID: 8cfb80d55e15f1c9a04b9504c3f0958b0a0d96d4e7e3356c4aaa607c318f4af9
                                                      • Opcode Fuzzy Hash: 0bb2224589e865e03c985b9c1812ac0c5239fdf46fb2e2b527489ce6b06a742a
                                                      • Instruction Fuzzy Hash: 9E5148B1D04249DFDB15DFA8C8A4AEEBFB5EF08318F14816AE805AB351D7709A04CF90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: DeleteFileSleep
                                                      • String ID:
                                                      • API String ID: 3161721237-0
                                                      • Opcode ID: edab04d75b6ec17bbfa116bff3a1e734e1b82741af8c1a2574b19b7543a7bf87
                                                      • Instruction ID: d81d0d3f887ae9d410525358fd059b67a24a52478363d46d70a3a7bc7f6f2d85
                                                      • Opcode Fuzzy Hash: edab04d75b6ec17bbfa116bff3a1e734e1b82741af8c1a2574b19b7543a7bf87
                                                      • Instruction Fuzzy Hash: 833123F290C7149FE315BF19E8C56AAFBE8EB58310F46092DEAC883740E67558448BD7
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA2D47
                                                      • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02CA2D5C
                                                        • Part of subcall function 02CAA514: WSAGetLastError.WS2_32(00000000,?,?,02CA2A51), ref: 02CAA522
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$Send
                                                      • String ID:
                                                      • API String ID: 1282938840-0
                                                      • Opcode ID: d3d04277f11caace2b3f4eb24644dbd1cb41ba25c145dc3d8a2c0d14361ef76d
                                                      • Instruction ID: c4baec18664c04c4191568f3af79006077e51abaa9026178cc214dc2962103e0
                                                      • Opcode Fuzzy Hash: d3d04277f11caace2b3f4eb24644dbd1cb41ba25c145dc3d8a2c0d14361ef76d
                                                      • Instruction Fuzzy Hash: D00184B590021AEFDB205F95D85496BFBFDFF85768B20052EE85993201EB709D00DB62
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA8412
                                                      • shutdown.WS2_32(?,00000002), ref: 02CA841B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastshutdown
                                                      • String ID:
                                                      • API String ID: 1920494066-0
                                                      • Opcode ID: 3b11767b8669d0a87396bcef4e99b9b026a13fd33f05be9c40302fff078b8ae4
                                                      • Instruction ID: 8931644204ddb3a68a5c88a5485390524563d54ef7250e9c216b74d7abd68d4b
                                                      • Opcode Fuzzy Hash: 3b11767b8669d0a87396bcef4e99b9b026a13fd33f05be9c40302fff078b8ae4
                                                      • Instruction Fuzzy Hash: 7EF0B471A04311CFCB10AF14D420B5ABBE5FF08324F10491CE99597380D730AC00DFA1
                                                      APIs
                                                      • HeapCreate.KERNEL32(00000000,00001000,00000000,0040327F,00000000), ref: 00404375
                                                        • Part of subcall function 0040421C: GetVersionExA.KERNEL32 ref: 0040423B
                                                      • HeapDestroy.KERNEL32 ref: 004043B4
                                                        • Part of subcall function 0040473B: HeapAlloc.KERNEL32(00000000,00000140,0040439D,000003F8), ref: 00404748
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocCreateDestroyVersion
                                                      • String ID:
                                                      • API String ID: 2507506473-0
                                                      • Opcode ID: 722f343bcc1d8d175d9e2b572cde26198cd65ff22fe77f0b72ae6e2e9ce6e364
                                                      • Instruction ID: b2207c572f0f3ed29129350844caab37b17516ac226c98ab5277a42ffae33650
                                                      • Opcode Fuzzy Hash: 722f343bcc1d8d175d9e2b572cde26198cd65ff22fe77f0b72ae6e2e9ce6e364
                                                      • Instruction Fuzzy Hash: D1F065F0741301D9DB206B719E4672635D49BC0B95F10443BFF00F91E0EB788480D61D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue
                                                      • String ID:
                                                      • API String ID: 3356406503-0
                                                      • Opcode ID: d20c488ff6a08eb9e7064dc00374236b6c0871d55316b5ea2b9727a328baab86
                                                      • Instruction ID: a0a994bfff9fe55e266ec5a9a70af8feed36be23909314c8e27541501629a910
                                                      • Opcode Fuzzy Hash: d20c488ff6a08eb9e7064dc00374236b6c0871d55316b5ea2b9727a328baab86
                                                      • Instruction Fuzzy Hash: DAD0C770D19501FEC7150BB45F1C62579705A0D34072144779553F54F5C97DC41E6A1F
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA511E
                                                        • Part of subcall function 02CA3D7E: htons.WS2_32(?), ref: 02CA3DA2
                                                        • Part of subcall function 02CA3D7E: htonl.WS2_32(00000000), ref: 02CA3DB9
                                                        • Part of subcall function 02CA3D7E: htonl.WS2_32(00000000), ref: 02CA3DC0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htonl$H_prologhtons
                                                      • String ID:
                                                      • API String ID: 4039807196-0
                                                      • Opcode ID: 5e2e9c5614574cf2b1f3c6f1c3204ced0846acdefcc0bfc2a8a8e61ee010b5ae
                                                      • Instruction ID: 9d85aedbe3b6a160985fe213dd8fd5cbb3f16a93a03aabfc2f5bbbfa0d136dcc
                                                      • Opcode Fuzzy Hash: 5e2e9c5614574cf2b1f3c6f1c3204ced0846acdefcc0bfc2a8a8e61ee010b5ae
                                                      • Instruction Fuzzy Hash: DE8149B1D0524ECECF05DFA8D4A0AEEBBB5AF48318F10815AD854B7240EB355A45CF74
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 82fd3e1a2990e82a70acceeffa9c19112c232fa5a7c2027932d6240210c1f9b6
                                                      • Instruction ID: 2c04db48db2870380a2c530da76ce379226f476606a86d9df6c986817cb16a33
                                                      • Opcode Fuzzy Hash: 82fd3e1a2990e82a70acceeffa9c19112c232fa5a7c2027932d6240210c1f9b6
                                                      • Instruction Fuzzy Hash: 752151B250C7009FD355AF09DC81A7AFBE9EF98720F16492DE6C583340EA7158508B9B
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CAE9D1
                                                        • Part of subcall function 02CA1A01: TlsGetValue.KERNEL32 ref: 02CA1A0A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologValue
                                                      • String ID:
                                                      • API String ID: 3700342317-0
                                                      • Opcode ID: 0451fa483188d023206026f5f405e4f1b92fb9827e50821fd894003fd5f2f048
                                                      • Instruction ID: 0f2eaef55259d25f0c6b9ad20556224799c5fc427b3b1299c8ec8de5f9719481
                                                      • Opcode Fuzzy Hash: 0451fa483188d023206026f5f405e4f1b92fb9827e50821fd894003fd5f2f048
                                                      • Instruction Fuzzy Hash: 15212FB290420AAFDB04DFA5D550AEEBBF9FF48314F14412EE919A7240D771AE01DBA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: a5de629df35775642c0e8cbbbc41b33236b62fa4d95e4fe61c5a7938561603c4
                                                      • Instruction ID: e8fe5859707f6fbc549bae05368edac21aeea4579fb092bb01e9ec797bb6d996
                                                      • Opcode Fuzzy Hash: a5de629df35775642c0e8cbbbc41b33236b62fa4d95e4fe61c5a7938561603c4
                                                      • Instruction Fuzzy Hash: 5F1191F250D204DFE709BE29ED8A379BBE1FB44310F064A3DE2C686684EE359454C647
                                                      APIs
                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02CA33CC
                                                        • Part of subcall function 02CA32AB: __EH_prolog.LIBCMT ref: 02CA32B0
                                                        • Part of subcall function 02CA32AB: RtlEnterCriticalSection.NTDLL(?), ref: 02CA32C3
                                                        • Part of subcall function 02CA32AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02CA32EF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                      • String ID:
                                                      • API String ID: 1518410164-0
                                                      • Opcode ID: fddfc090abc84490db45e254243149f1af2814e00daf22158103816102efdac7
                                                      • Instruction ID: 91ad2cf4b007551087929ea37ae6fcb29693feab02ce95eef1b506360f51c9b5
                                                      • Opcode Fuzzy Hash: fddfc090abc84490db45e254243149f1af2814e00daf22158103816102efdac7
                                                      • Instruction Fuzzy Hash: 3F018470615607AFD704CF59D895F55BBA9FF45324B208359E928872C0EB70E921CBA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 2506c22db63a8f45ef4f384ffaaf592b720d483a129740c354e867e787ed5e4b
                                                      • Instruction ID: ee4d28816523dfbfd8a57ed40fd306aa0b9171863ea48dc751ca68062d6d752d
                                                      • Opcode Fuzzy Hash: 2506c22db63a8f45ef4f384ffaaf592b720d483a129740c354e867e787ed5e4b
                                                      • Instruction Fuzzy Hash: A50152B141C7049FD359BF19D88563AFBE4EF44710F11092DE6C687340EA711854CB9B
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: f91d827e0a38914d5e2db52f03306791d9ae343c605526fd0cb82eb9bb8b11ed
                                                      • Instruction ID: eeed3efb4c314e7d46815255fa456da70e72a1240644996f5b6bdeaaab9c4fc8
                                                      • Opcode Fuzzy Hash: f91d827e0a38914d5e2db52f03306791d9ae343c605526fd0cb82eb9bb8b11ed
                                                      • Instruction Fuzzy Hash: 4501B3B150C7049FE761BF19D885B6AFBE8EF94710F12881CE7D487240E6345854CB87
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 4933ea4557d84ec30270a86d8d0bd2aa8003be1fff3eafd966960012eb0c8921
                                                      • Instruction ID: 14975bcfd13c967d78533d861bb855a7cff82ab4dc0e7f935066b6de58e6ee88
                                                      • Opcode Fuzzy Hash: 4933ea4557d84ec30270a86d8d0bd2aa8003be1fff3eafd966960012eb0c8921
                                                      • Instruction Fuzzy Hash: 4101D2F251C600DFE705BF19D88676AFBE4FB48310F06092DE6C983640E6349894CB8B
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Query_
                                                      • String ID:
                                                      • API String ID: 428220571-0
                                                      • Opcode ID: 0cf7acca78fd7c740879086b48365006fcb445574e4dfac3854be80b35940055
                                                      • Instruction ID: 4473c676fab409761f2b17a2376816ee019e4ebf03f045e917a4393fef99945a
                                                      • Opcode Fuzzy Hash: 0cf7acca78fd7c740879086b48365006fcb445574e4dfac3854be80b35940055
                                                      • Instruction Fuzzy Hash: A6014FB150C200EFE70AAF19D99573DBBE5EF44311F15892CD6C683744E6315954CB86
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CAE561
                                                        • Part of subcall function 02CA26DB: RtlEnterCriticalSection.NTDLL(?), ref: 02CA2706
                                                        • Part of subcall function 02CA26DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02CA272B
                                                        • Part of subcall function 02CA26DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02CC5B63), ref: 02CA2738
                                                        • Part of subcall function 02CA26DB: SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02CA2778
                                                        • Part of subcall function 02CA26DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02CA27D9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                      • String ID:
                                                      • API String ID: 4293676635-0
                                                      • Opcode ID: e79d5d073d70fcd9ee41b7abf2d6a8a2599b220af2459fcd683160fc8dce529b
                                                      • Instruction ID: ae0b073892e63ced1050c27fb13ef94b7782c92c3ac91474720309f78a12fa99
                                                      • Opcode Fuzzy Hash: e79d5d073d70fcd9ee41b7abf2d6a8a2599b220af2459fcd683160fc8dce529b
                                                      • Instruction Fuzzy Hash: 0C01DCB1900B049FC318CF1AC640986FBF5EF88300B25C5AED44A8B721E370AA40CF90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: e794df688e6f2a622ed096311b5b0fcf1958392e18893c8252c28a9243ec680e
                                                      • Instruction ID: 5db17ac8dff8d8b32c78856e049c5f285f5d79b6c821da9f8482b44ef387427f
                                                      • Opcode Fuzzy Hash: e794df688e6f2a622ed096311b5b0fcf1958392e18893c8252c28a9243ec680e
                                                      • Instruction Fuzzy Hash: B8F0A030E006059FDB10CF28C8C098A3BA0BB483A0B990669E8358B2D8D330DA998B60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _malloc
                                                      • String ID:
                                                      • API String ID: 1579825452-0
                                                      • Opcode ID: e4e2f94e1253c5da7cf060dc78f881184bfac5ea4f385a17cf1f0135f03c8c7b
                                                      • Instruction ID: d1f76bbc17d8575ca7fbaf2fbf2470047f4bf6cafd337f1bd981a641203e7f13
                                                      • Opcode Fuzzy Hash: e4e2f94e1253c5da7cf060dc78f881184bfac5ea4f385a17cf1f0135f03c8c7b
                                                      • Instruction Fuzzy Hash: 98E0C0B0A1E3456FDB04E67C7C4ABC97FE08F09724F0441AFE90856282C3300500C651
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: ManagerOpen
                                                      • String ID:
                                                      • API String ID: 1889721586-0
                                                      • Opcode ID: 87d1620d0670ea53695bcc52c447bb5fbb50ecd8887e20494873f583bf0b15dc
                                                      • Instruction ID: 9e89be935429073048ac319430ad1762680d5b2396473d1f22bc7d52afc6d7ad
                                                      • Opcode Fuzzy Hash: 87d1620d0670ea53695bcc52c447bb5fbb50ecd8887e20494873f583bf0b15dc
                                                      • Instruction Fuzzy Hash: 5AE048E5C0D6C2EED3414A605DE59B6AEBC5D1230C33554EBD542761D3E139010FF62E
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CAE340
                                                        • Part of subcall function 02CB3B5C: _malloc.LIBCMT ref: 02CB3B74
                                                        • Part of subcall function 02CAE55C: __EH_prolog.LIBCMT ref: 02CAE561
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_malloc
                                                      • String ID:
                                                      • API String ID: 4254904621-0
                                                      • Opcode ID: 3b937d46f31850317f5257c32ea0c7efba0e104ad8427957e9eda12b352b8cc8
                                                      • Instruction ID: 70a72d59ca49857bd90744660f3e73487f8fa7712d2838dfd6a9b874d8d2d3a8
                                                      • Opcode Fuzzy Hash: 3b937d46f31850317f5257c32ea0c7efba0e104ad8427957e9eda12b352b8cc8
                                                      • Instruction Fuzzy Hash: 82E01DB1A055056BDB0DEF68D82176E7766EF84305F20457DB40DD7650EB7099009A54
                                                      APIs
                                                        • Part of subcall function 02CB5C6A: __getptd_noexit.LIBCMT ref: 02CB5C6B
                                                        • Part of subcall function 02CB5C6A: __amsg_exit.LIBCMT ref: 02CB5C78
                                                        • Part of subcall function 02CB34A3: __getptd_noexit.LIBCMT ref: 02CB34A7
                                                        • Part of subcall function 02CB34A3: __freeptd.LIBCMT ref: 02CB34C1
                                                        • Part of subcall function 02CB34A3: RtlExitUserThread.NTDLL(?,00000000,?,02CB3483,00000000), ref: 02CB34CA
                                                      • __XcptFilter.LIBCMT ref: 02CB348F
                                                        • Part of subcall function 02CB8DA4: __getptd_noexit.LIBCMT ref: 02CB8DA8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                      • String ID:
                                                      • API String ID: 1405322794-0
                                                      • Opcode ID: 658bfe5b061b6237cb98a44149cdf00a59474c35edfbb79ad6373d82ddbfd988
                                                      • Instruction ID: 2f4eb4f4d69eefa1e1fedf400abf0cd98c41eabf5368c325c3c802c146f77a6e
                                                      • Opcode Fuzzy Hash: 658bfe5b061b6237cb98a44149cdf00a59474c35edfbb79ad6373d82ddbfd988
                                                      • Instruction Fuzzy Hash: 78E0ECB19106019FEB09ABB0DD45FAD776AEF44711F240189E102AB2A0DA74A940AE20
                                                      APIs
                                                      • _malloc.LIBCMT ref: 02CA6203
                                                        • Part of subcall function 02CB2FBC: __FF_MSGBANNER.LIBCMT ref: 02CB2FD3
                                                        • Part of subcall function 02CB2FBC: __NMSG_WRITE.LIBCMT ref: 02CB2FDA
                                                        • Part of subcall function 02CB2FBC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02CB2FFF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap_malloc
                                                      • String ID:
                                                      • API String ID: 501242067-0
                                                      • Opcode ID: 188a1f7fa3e001cf71eb21ab9771bf59af255c0a52dd1f3cde43239836da8ca5
                                                      • Instruction ID: 3d22bff21437e2d9ce4999af77082222e00f049ab856580936ee14df9cb3bff1
                                                      • Opcode Fuzzy Hash: 188a1f7fa3e001cf71eb21ab9771bf59af255c0a52dd1f3cde43239836da8ca5
                                                      • Instruction Fuzzy Hash: 16C012B09092097F8708AAE9188999B7EAC8B08B00F50416E694592381E5700940C5A5
                                                      APIs
                                                      • RegOpenKeyExA.KERNEL32(80000002), ref: 0040D47F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: 5c0f6b44e233f340a1ef6499d06d65c38e805a9ddf2c7fb8b0de505a5ba75a44
                                                      • Instruction ID: 220c7ac7ad5a98b09f4306e65487f8080d40e1fb45b1172eb7e06e0e215b3403
                                                      • Opcode Fuzzy Hash: 5c0f6b44e233f340a1ef6499d06d65c38e805a9ddf2c7fb8b0de505a5ba75a44
                                                      • Instruction Fuzzy Hash: EEC08C30E08402D9D3004AF08A08B3A6660AB14380F30093B8803F00C9D638800EE86F
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 3ab7611dbc87d2bd69f653947e468e9d27ae08c97c71c274a050c06e68eb241d
                                                      • Instruction ID: 662f04315c93087ae2cadca1eb01e378dbef3a0dcfde7c8be2df982919fc1138
                                                      • Opcode Fuzzy Hash: 3ab7611dbc87d2bd69f653947e468e9d27ae08c97c71c274a050c06e68eb241d
                                                      • Instruction Fuzzy Hash: 85C09BB184C71CD7D25535457C49379B7689B10322F490514E79641741FD24E958C6D7
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Value
                                                      • String ID:
                                                      • API String ID: 3702945584-0
                                                      • Opcode ID: 9663ea35260ee1dde475dfa5f016a3a19870ec03042c2f61d1c730cb042280e3
                                                      • Instruction ID: 652f8c2140a9e76d363f83aa750936afa9a13c2cd6b45acb6b94c931cd2afd60
                                                      • Opcode Fuzzy Hash: 9663ea35260ee1dde475dfa5f016a3a19870ec03042c2f61d1c730cb042280e3
                                                      • Instruction Fuzzy Hash: 6CC04866808000D6C7052BC09E898AA2A30AA40304720C2B7A496700E5CB39485EAA1E
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory
                                                      • String ID:
                                                      • API String ID: 4241100979-0
                                                      • Opcode ID: 73adb20238a065e9b28a2a917b88fd5c544e6830d03984137754be98a0fa5b92
                                                      • Instruction ID: f68830f82549bd0bab97dbdac28d836308fbc84dface4e9641923ce1f1185cb5
                                                      • Opcode Fuzzy Hash: 73adb20238a065e9b28a2a917b88fd5c544e6830d03984137754be98a0fa5b92
                                                      • Instruction Fuzzy Hash: E0A02230A8E000E3C2002BE00F08C2B38282A0A3A0330803B3303B00E30CBC080F2B2F
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CopyFile
                                                      • String ID:
                                                      • API String ID: 1304948518-0
                                                      • Opcode ID: 8c635a22f432b7876f3c961c17ac317f32d9a683c6afc56cd79fbf400df0f043
                                                      • Instruction ID: 8af6a99cd66f80ef4b53a792cf7c882dc78f0a48cb70ff16c053d4cf097a92c0
                                                      • Opcode Fuzzy Hash: 8c635a22f432b7876f3c961c17ac317f32d9a683c6afc56cd79fbf400df0f043
                                                      • Instruction Fuzzy Hash: 3D900230204101AAD2100A215F5C615376855046C131544796447E0090DE74808A651D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Close
                                                      • String ID:
                                                      • API String ID: 3535843008-0
                                                      • Opcode ID: 4c5b7f853fd881f140fd76807a49d5d1d5698e5fd09c78d2d2b1cac62787eb44
                                                      • Instruction ID: 4c944e19c57bb1c5be4b9371c97cdcc2daf67734a90216251f1beaee8c65c53a
                                                      • Opcode Fuzzy Hash: 4c5b7f853fd881f140fd76807a49d5d1d5698e5fd09c78d2d2b1cac62787eb44
                                                      • Instruction Fuzzy Hash:
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 9adc791449f42c26bfdd0a0070be040f50248ef9f22e8b7ada9d1a0bb04c4588
                                                      • Instruction ID: 2ed4b8093d02e781a33cb2b3abe24850d68c54413b4615fdc604f252486dff82
                                                      • Opcode Fuzzy Hash: 9adc791449f42c26bfdd0a0070be040f50248ef9f22e8b7ada9d1a0bb04c4588
                                                      • Instruction Fuzzy Hash: F001CB6251814162DA0681F64D2E7A93F129F02338FA0067BD119FF5F1CA798007971C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 82fad98d179be4321a4bbfa73a9e1c80d5e44dbbaf7215c6395e57a1c6e6d44d
                                                      • Instruction ID: cd00bca03000d0fdbd760ea4f6728cac73b54144a1d77f31ddf4852d5d488a0e
                                                      • Opcode Fuzzy Hash: 82fad98d179be4321a4bbfa73a9e1c80d5e44dbbaf7215c6395e57a1c6e6d44d
                                                      • Instruction Fuzzy Hash: 100147A0C0C102EADB0A1AA04F6A2B62BA8AB02341B39007BCC53F22D1E27C400B655F
                                                      APIs
                                                        • Part of subcall function 02CB1620: OpenEventA.KERNEL32(00100002,00000000,00000000,03949DF0), ref: 02CB16C0
                                                        • Part of subcall function 02CB1620: CloseHandle.KERNEL32(00000000), ref: 02CB16D5
                                                        • Part of subcall function 02CB1620: ResetEvent.KERNEL32(00000000,03949DF0), ref: 02CB16DF
                                                        • Part of subcall function 02CB1620: CloseHandle.KERNEL32(00000000,03949DF0), ref: 02CB1714
                                                      • TlsSetValue.KERNEL32(00000029,?), ref: 02CB21BA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEventHandle$OpenResetValue
                                                      • String ID:
                                                      • API String ID: 1556185888-0
                                                      • Opcode ID: 9291f95689c9cca5d51e89b7d4d63674c809e9d4ffac128f0122367c089b117b
                                                      • Instruction ID: 358c9f24fab835170df0d4924b6a605ee23e0c83912761bf6626112c0b059d91
                                                      • Opcode Fuzzy Hash: 9291f95689c9cca5d51e89b7d4d63674c809e9d4ffac128f0122367c089b117b
                                                      • Instruction Fuzzy Hash: E6018F71E40244ABD700CF69DC45B9ABBACFF09670F14476AF825D3280D77169008AA5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 866e22e53fe25fd0bdb740db051d663f708320689fe36e77b7db1bf97aa53f13
                                                      • Instruction ID: 06d8dd56d7359697f21760d10dd4b6b7296226a5590ce252e70bb28f4123d7cc
                                                      • Opcode Fuzzy Hash: 866e22e53fe25fd0bdb740db051d663f708320689fe36e77b7db1bf97aa53f13
                                                      • Instruction Fuzzy Hash: 28F021B95005169FC605EFB4DD4DAD637345B08304F100126F505F72C1C679D945DB2A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 691837882858ed27f3f2fe7ad3b0d08b871936dade86845a6b4c990bb027e028
                                                      • Instruction ID: ec41c10c5ad916b07eb098b5e95315b7412b3afd3142fdb78a43372ac2cf1835
                                                      • Opcode Fuzzy Hash: 691837882858ed27f3f2fe7ad3b0d08b871936dade86845a6b4c990bb027e028
                                                      • Instruction Fuzzy Hash: 93E09231D08200EAD22117D46E4D7343734A70170DF3252BFE506B44E1557C044B6A0F
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpi
                                                      • String ID:
                                                      • API String ID: 1586166983-0
                                                      • Opcode ID: fd52cbc2dbaf595f515077ef03c1670919b7c1bae33b51643c7a4766221a1453
                                                      • Instruction ID: e307dfa304e755b31afd0efe619b43e83cda812c5f7127ad9126f051c0f3b200
                                                      • Opcode Fuzzy Hash: fd52cbc2dbaf595f515077ef03c1670919b7c1bae33b51643c7a4766221a1453
                                                      • Instruction Fuzzy Hash: F9D0C720E0050ADAEB082BB18E1C67E62A0A300700B20023FAC13F22D0E778460A2A8B
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: b26ebb5cf8a148e7ddff41efd1f3ba39ecbf9e6e32f2954ebfeae19815505537
                                                      • Instruction ID: e949e2cfc28cce4461b8860594bd21676822d264989b34ce0183c01cac3b2362
                                                      • Opcode Fuzzy Hash: b26ebb5cf8a148e7ddff41efd1f3ba39ecbf9e6e32f2954ebfeae19815505537
                                                      • Instruction Fuzzy Hash: C2C04C2195A520D6D10457906A4D7343660A71471BF35623BA287754D445BD04476A0F
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000), ref: 0040DCDE
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 3dfbc2051f3e62ff2853e52f952158cf5c8ea28ee06ddca20242f6377ce7918a
                                                      • Instruction ID: f5dd882bff3846f4d28b85770696867c73836a8ee19a5c50b5995cdf5ae02b03
                                                      • Opcode Fuzzy Hash: 3dfbc2051f3e62ff2853e52f952158cf5c8ea28ee06ddca20242f6377ce7918a
                                                      • Instruction Fuzzy Hash: 6AC08C70804100EFE2010BA04E487787A24A704300F120022A146B50D0CAB48454EBA6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
                                                      • API String ID: 0-1157002505
                                                      • Opcode ID: 77b899b18de51c16fda490ab446002469581ee85db90d99b5a4b47e0ade2e1f8
                                                      • Instruction ID: 0dcf850e16222393e78044dcb3487124ee4404a68bb3b9157b6389de73fd9ba9
                                                      • Opcode Fuzzy Hash: 77b899b18de51c16fda490ab446002469581ee85db90d99b5a4b47e0ade2e1f8
                                                      • Instruction Fuzzy Hash: C3E1C230E58249DEEB258B64C9457BE77B1AB04304F68417BE841B63C2D37CA982DB5F
                                                      APIs
                                                        • Part of subcall function 02CA9AE4: __EH_prolog.LIBCMT ref: 02CA9AE9
                                                        • Part of subcall function 02CA9AE4: _Allocate.LIBCPMT ref: 02CA9B40
                                                        • Part of subcall function 02CA9AE4: _memmove.LIBCMT ref: 02CA9B97
                                                      • _memset.LIBCMT ref: 02CB0949
                                                      • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02CB09B2
                                                      • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02CB09BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                      • String ID: Unknown error$invalid string position
                                                      • API String ID: 1854462395-1837348584
                                                      • Opcode ID: 62b974abee247d4274dd80485d143de95d871870986116baad7e9a03b90af4a8
                                                      • Instruction ID: 8b1f76c5b86797ed1b83c33314c3ef89a693b9e9f0707331f36ea739bb1c70f4
                                                      • Opcode Fuzzy Hash: 62b974abee247d4274dd80485d143de95d871870986116baad7e9a03b90af4a8
                                                      • Instruction Fuzzy Hash: DE51BB706483418FEB15CF25C8A0B6FBBE4AF98348F50092DF49297691D771E688CF92
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02CB4EA6,?,?,?,00000001), ref: 02CB953D
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02CB9546
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 26220e99c824a745dadc2192d1c7eaa2803e0576939862784f5ef31d57d91d93
                                                      • Instruction ID: 0962f7d02fe6e2056d904f6e592ae6c3177d91247f6c6329c84d3191370f7124
                                                      • Opcode Fuzzy Hash: 26220e99c824a745dadc2192d1c7eaa2803e0576939862784f5ef31d57d91d93
                                                      • Instruction Fuzzy Hash: 9CB09231484208EBCB012B91EC0DB89BF2CEB04672F104910F60E840508B625425AFE1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memset
                                                      • String ID:
                                                      • API String ID: 2102423945-0
                                                      • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                      • Instruction ID: c13ad1aba5a7dd3b84911c7972b8f9d68cc49eee3df593ce70d746046f73afbd
                                                      • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                      • Instruction Fuzzy Hash: 18F082B5904309AAD714DF95D942B8DFBB8FF44314F208169D508A7340E6B17A118B90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID:
                                                      • API String ID: 481472006-0
                                                      • Opcode ID: 4e32cddb3ec93ecf8e60210a7ab1f820463942024ea86af672f064e304be2028
                                                      • Instruction ID: 6341a0f23a79cca1e11698f05db7c7c32ed1b044b7d1cc9e9c064670858c838c
                                                      • Opcode Fuzzy Hash: 4e32cddb3ec93ecf8e60210a7ab1f820463942024ea86af672f064e304be2028
                                                      • Instruction Fuzzy Hash: 04F0277AE140504BC314DF747F156E13FF1A3057507060136E982F3162D2740C05DB0C
                                                      APIs
                                                      • StartServiceCtrlDispatcherA.ADVAPI32 ref: 00402232
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CtrlDispatcherServiceStart
                                                      • String ID:
                                                      • API String ID: 3789849863-0
                                                      • Opcode ID: b694073fe3e0b5d256c4a091afe1b4493c8e1995b307ab6af674c20cd0e39d85
                                                      • Instruction ID: a8a0757c78a477787522b294a0d6ae56078fb4f8ba38f200c3a9dc71ea8e0ba8
                                                      • Opcode Fuzzy Hash: b694073fe3e0b5d256c4a091afe1b4493c8e1995b307ab6af674c20cd0e39d85
                                                      • Instruction Fuzzy Hash: 2CD05E14A0C1858DEB011B706F4E3E62B159342310F20807B80A7B55D3C6BD064BEB2F
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: CreateService
                                                      • String ID:
                                                      • API String ID: 1592570254-0
                                                      • Opcode ID: 3bebca01eccc6578c8a7a657c169d8e5431aba476c254f9b01c7d77c1f10cb11
                                                      • Instruction ID: 240f4b4efb56b1c2ef13816fbd533881a54980296feb1fa3c688e689bffc6dc9
                                                      • Opcode Fuzzy Hash: 3bebca01eccc6578c8a7a657c169d8e5431aba476c254f9b01c7d77c1f10cb11
                                                      • Instruction Fuzzy Hash: E5B01260D0C001DAC1501EC00D4443615191450740330883AA103F00C0C5B8004EB9BF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c970d07b5a8736805000ccf49c2c3e0be1249f32b7b106dff15c019d43e397c2
                                                      • Instruction ID: c8bfbb54730352564b930089ec95ced814cd77ea998b2ca2cce047e86fd9f603
                                                      • Opcode Fuzzy Hash: c970d07b5a8736805000ccf49c2c3e0be1249f32b7b106dff15c019d43e397c2
                                                      • Instruction Fuzzy Hash: 1E520D37E4062A9BDB14CE9ACCC05C9B7A3AFC825475BC265CD58BB305D6B4BD06CAD0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8565dba51f62ca82745c93959c5409f40a5920b3d56ea50adc44597dd0b8764c
                                                      • Instruction ID: 84f2ddf535e0b305667e0fc1eaa7a677a232d616235e0f268fbef1196e0916c4
                                                      • Opcode Fuzzy Hash: 8565dba51f62ca82745c93959c5409f40a5920b3d56ea50adc44597dd0b8764c
                                                      • Instruction Fuzzy Hash: 182210B3F211144BCB48CE6DCC927DAB6E3BFD821871E8539E809E7705E639D9158A84
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                      • Instruction ID: 2eeb0b02d18e8e5091446b062df29c08fc6edb0187b8e25c4f5aca23f078221a
                                                      • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                      • Instruction Fuzzy Hash: 3EC1A2322151A34DDF6F463A84745FEBAA15ED2EB5B4A076DD4B3CB1C6EF10C228D620
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction ID: 78c0c4e795e0554f68f4cbac89da104ab746b29b6568dc82ceba4802d5ac460e
                                                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction Fuzzy Hash: 4BC195322151534EDF2F463A84345FEBAA15ED2EB5B4A076DE4B3CB1D6EF20C224D620
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: af41b0c7e6cf134d524e8d64f6e4ae55e63b512cb5e841b2e55a01beb2b74a01
                                                      • Instruction ID: a42d24ad3a6fb18dd8d66be16c581d82c7a306d1cb0e87925171907ef8f84c95
                                                      • Opcode Fuzzy Hash: af41b0c7e6cf134d524e8d64f6e4ae55e63b512cb5e841b2e55a01beb2b74a01
                                                      • Instruction Fuzzy Hash: 30A1F6319081559BEB19CA98C0A07BD7B71EF41304F2880BEC8937B7E2C678D946D785
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CDA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CDA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2cda000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 00933e5b5288a1e4190df1966e2d496ba9fa2a7f70829db8f569a56ba99b24b0
                                                      • Instruction ID: 7b770bf8824eff420be8f7206e202ca8eeb2849df42b3ceffbd640d57253be5c
                                                      • Opcode Fuzzy Hash: 00933e5b5288a1e4190df1966e2d496ba9fa2a7f70829db8f569a56ba99b24b0
                                                      • Instruction Fuzzy Hash: E1C012DD03D3E0300FFCF03838448E303D002E73027F03842D84045090500192473224
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA24E6
                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02CA24FC
                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 02CA250E
                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 02CA256D
                                                      • SetLastError.KERNEL32(00000000,?,76F8DFB0), ref: 02CA257F
                                                      • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,76F8DFB0), ref: 02CA2599
                                                      • GetLastError.KERNEL32(?,76F8DFB0), ref: 02CA25A2
                                                      • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02CA25F0
                                                      • InterlockedDecrement.KERNEL32(00000002), ref: 02CA262F
                                                      • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02CA268E
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CA2699
                                                      • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02CA26AD
                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,76F8DFB0), ref: 02CA26BD
                                                      • GetLastError.KERNEL32(?,76F8DFB0), ref: 02CA26C7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                      • String ID:
                                                      • API String ID: 1213838671-0
                                                      • Opcode ID: 138b0c072ae0b8a7785b425ecb844cbb4ba2e21049415356f800896231200a70
                                                      • Instruction ID: 078ad80f4c124c966be94c5431bed631fe78523a65551423833ba83d969ddc9d
                                                      • Opcode Fuzzy Hash: 138b0c072ae0b8a7785b425ecb844cbb4ba2e21049415356f800896231200a70
                                                      • Instruction Fuzzy Hash: 3761307190021AEFCB11DFA4D994AEEFBB9FF48314F10452AE916E3640D7349A54CFA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA4608
                                                        • Part of subcall function 02CB3B5C: _malloc.LIBCMT ref: 02CB3B74
                                                      • htons.WS2_32(?), ref: 02CA4669
                                                      • htonl.WS2_32(?), ref: 02CA468C
                                                      • htonl.WS2_32(00000000), ref: 02CA4693
                                                      • htons.WS2_32(00000000), ref: 02CA4747
                                                      • _sprintf.LIBCMT ref: 02CA475D
                                                        • Part of subcall function 02CA8997: _memmove.LIBCMT ref: 02CA89B7
                                                      • htons.WS2_32(?), ref: 02CA46B0
                                                        • Part of subcall function 02CA9742: __EH_prolog.LIBCMT ref: 02CA9747
                                                        • Part of subcall function 02CA9742: RtlEnterCriticalSection.NTDLL(00000020), ref: 02CA97C2
                                                        • Part of subcall function 02CA9742: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02CA97E0
                                                        • Part of subcall function 02CA1BA7: __EH_prolog.LIBCMT ref: 02CA1BAC
                                                        • Part of subcall function 02CA1BA7: RtlEnterCriticalSection.NTDLL ref: 02CA1BBC
                                                        • Part of subcall function 02CA1BA7: RtlLeaveCriticalSection.NTDLL ref: 02CA1BEA
                                                        • Part of subcall function 02CA1BA7: RtlEnterCriticalSection.NTDLL ref: 02CA1C13
                                                        • Part of subcall function 02CA1BA7: RtlLeaveCriticalSection.NTDLL ref: 02CA1C56
                                                        • Part of subcall function 02CADEFE: __EH_prolog.LIBCMT ref: 02CADF03
                                                      • htonl.WS2_32(?), ref: 02CA497C
                                                      • htonl.WS2_32(00000000), ref: 02CA4983
                                                      • htonl.WS2_32(00000000), ref: 02CA49C8
                                                      • htonl.WS2_32(00000000), ref: 02CA49CF
                                                      • htons.WS2_32(?), ref: 02CA49EF
                                                      • htons.WS2_32(?), ref: 02CA49F9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                      • String ID:
                                                      • API String ID: 1645262487-0
                                                      • Opcode ID: 8e906a55228fd3a79f6fb068a6fbbcd594bdfe54f3171637a6751baa7b2d67b4
                                                      • Instruction ID: 4e8bc3bb6c175f1345131e3ea232806f09a52468b89c906f5b3299fd16829c9b
                                                      • Opcode Fuzzy Hash: 8e906a55228fd3a79f6fb068a6fbbcd594bdfe54f3171637a6751baa7b2d67b4
                                                      • Instruction Fuzzy Hash: F4027A71C0125AEFDF25DFA4D864BEEBBB9AF04308F10415AE505B7280DBB45A48DFA1
                                                      APIs
                                                      • RegisterServiceCtrlHandlerA.ADVAPI32(epiAvidenta,Function_0000235E), ref: 004023C1
                                                      • SetServiceStatus.ADVAPI32(0040C428), ref: 00402420
                                                      • GetLastError.KERNEL32 ref: 00402422
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                      • GetLastError.KERNEL32 ref: 00402450
                                                      • SetServiceStatus.ADVAPI32(0040C428), ref: 00402480
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                      • CloseHandle.KERNEL32 ref: 004024A1
                                                      • SetServiceStatus.ADVAPI32(0040C428), ref: 004024CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                      • String ID: epiAvidenta
                                                      • API String ID: 3346042915-1511824811
                                                      • Opcode ID: 753a0235ba5695e58019e6aa29ec1da7c6dc0c1f9df913e85715c4e46543780f
                                                      • Instruction ID: a3e3ef7f37124685fff7eb82f843286fe872226498ea529b62b56e64eae557f7
                                                      • Opcode Fuzzy Hash: 753a0235ba5695e58019e6aa29ec1da7c6dc0c1f9df913e85715c4e46543780f
                                                      • Instruction Fuzzy Hash: 7B21C571401200EBD2105F26EFE9A6ABEA8FBC5758B51433EE504B22B1CBB90408CF6C
                                                      APIs
                                                      • RtlDecodePointer.NTDLL(?), ref: 02CB834A
                                                      • _free.LIBCMT ref: 02CB8363
                                                        • Part of subcall function 02CB2F84: HeapFree.KERNEL32(00000000,00000000,?,02CB5CE2,00000000,00000104,76F90A60), ref: 02CB2F98
                                                        • Part of subcall function 02CB2F84: GetLastError.KERNEL32(00000000,?,02CB5CE2,00000000,00000104,76F90A60), ref: 02CB2FAA
                                                      • _free.LIBCMT ref: 02CB8376
                                                      • _free.LIBCMT ref: 02CB8394
                                                      • _free.LIBCMT ref: 02CB83A6
                                                      • _free.LIBCMT ref: 02CB83B7
                                                      • _free.LIBCMT ref: 02CB83C2
                                                      • _free.LIBCMT ref: 02CB83E6
                                                      • RtlEncodePointer.NTDLL(0088C908), ref: 02CB83ED
                                                      • _free.LIBCMT ref: 02CB8402
                                                      • _free.LIBCMT ref: 02CB8418
                                                      • _free.LIBCMT ref: 02CB8440
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 3064303923-0
                                                      • Opcode ID: 153206e6a4d3a8e215b5ea49c0acd8a301ce1572d537f56126596e4afada672d
                                                      • Instruction ID: 6b49f7f110a87805b4710f1a9baf210cac2904252645ea418dfd97913e6ef74d
                                                      • Opcode Fuzzy Hash: 153206e6a4d3a8e215b5ea49c0acd8a301ce1572d537f56126596e4afada672d
                                                      • Instruction Fuzzy Hash: F221B431C42221CBC7265F14F844799B76DFF40326B290B29D808DB240C735A865CFD6
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA3428
                                                      • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02CA346B
                                                      • GetProcAddress.KERNEL32(00000000), ref: 02CA3472
                                                      • GetLastError.KERNEL32 ref: 02CA3486
                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02CA34D7
                                                      • RtlEnterCriticalSection.NTDLL(00000018), ref: 02CA34ED
                                                      • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02CA3518
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                      • String ID: CancelIoEx$KERNEL32
                                                      • API String ID: 2902213904-434325024
                                                      • Opcode ID: fbff1660b0cd2c46d5edd32738b13ca3c081a705d3402b4ea6699786f99879f5
                                                      • Instruction ID: 60c102fe9d8c09edd781cb1825ccd8d12143a1cc7d902b9290ed7cb897953645
                                                      • Opcode Fuzzy Hash: fbff1660b0cd2c46d5edd32738b13ca3c081a705d3402b4ea6699786f99879f5
                                                      • Instruction Fuzzy Hash: 24319EB1900346DFDB019F68C8647AABBF8FF88329F1045A9E815AB241D770D901CFA1
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,004046F1,?,Microsoft Visual C++ Runtime Library,00012010,?,00408594,?,004085E4,?,?,?,Runtime Error!Program: ), ref: 004068FA
                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00406912
                                                      • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00406923
                                                      • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00406930
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                      • API String ID: 2238633743-4044615076
                                                      • Opcode ID: f034dd86a801bf7db4410674f220bc356b78f5ea9e9dff596629c7f08716684c
                                                      • Instruction ID: faa25dc698437583564e0aa63e06cb7ac2b3dbfa77251ff515169e4014cab309
                                                      • Opcode Fuzzy Hash: f034dd86a801bf7db4410674f220bc356b78f5ea9e9dff596629c7f08716684c
                                                      • Instruction Fuzzy Hash: A30179B1700302ABC7209FB55FC0E2B3A989A58780702183EB155F25A0DE758416AB1D
                                                      APIs
                                                      • LCMapStringW.KERNEL32(00000000,00000100,00408660,00000001,00000000,00000000,00000103,00000001,00000000,?,00406687,00200020,00000000,?,00000000,00000000), ref: 00406C09
                                                      • LCMapStringA.KERNEL32(00000000,00000100,0040865C,00000001,00000000,00000000,?,00406687,00200020,00000000,?,00000000,00000000,00000001), ref: 00406C25
                                                      • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00406687,?,00000103,00000001,00000000,?,00406687,00200020,00000000,?,00000000,00000000), ref: 00406C6E
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406687,00200020,00000000,?,00000000,00000000), ref: 00406CA6
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406687,00200020,00000000,?,00000000), ref: 00406CFE
                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406687,00200020,00000000,?,00000000), ref: 00406D14
                                                      • LCMapStringW.KERNEL32(00000000,?,00406687,00000000,00406687,?,?,00406687,00200020,00000000,?,00000000), ref: 00406D47
                                                      • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406687,00200020,00000000,?,00000000), ref: 00406DAF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: String$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 352835431-0
                                                      • Opcode ID: 046527286ea761e929c24e8a76dd342f94a46cb6194575d5b62c008d899f055f
                                                      • Instruction ID: 3dbc1a8ea87845f159938d7fde4ffb0cd1a839876cc8b227a434aa4f06241865
                                                      • Opcode Fuzzy Hash: 046527286ea761e929c24e8a76dd342f94a46cb6194575d5b62c008d899f055f
                                                      • Instruction Fuzzy Hash: C3517D31500209EFCF229F94DE45A9F7FB5FF48750F11412AF952B22A0C7398921DB69
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040463A
                                                      • GetStdHandle.KERNEL32(000000F4,00408594,00000000,?,00000000,00000000), ref: 00404710
                                                      • WriteFile.KERNEL32(00000000), ref: 00404717
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: File$HandleModuleNameWrite
                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                      • API String ID: 3784150691-4022980321
                                                      • Opcode ID: cfdbc0c0b212463ed00360a0469d8f7f48b0333d82c66fc394656b8192595d8d
                                                      • Instruction ID: 07c472cc77dbba7c6253ad415bbca102af262502dd18548cafcac9ea59a8ce0e
                                                      • Opcode Fuzzy Hash: cfdbc0c0b212463ed00360a0469d8f7f48b0333d82c66fc394656b8192595d8d
                                                      • Instruction Fuzzy Hash: 0931E6B26412186FDF20EA60CD46F9A376CAF86305F10047FF685F61D1EA7DAA448E1D
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,004032A4), ref: 00403F2D
                                                      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,004032A4), ref: 00403F41
                                                      • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,004032A4), ref: 00403F6D
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,004032A4), ref: 00403FA5
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,004032A4), ref: 00403FC7
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,004032A4), ref: 00403FE0
                                                      • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,004032A4), ref: 00403FF3
                                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00404031
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                      • String ID:
                                                      • API String ID: 1823725401-0
                                                      • Opcode ID: 159d32df7d36a6c9e64a338db4b0faf782f6f3d8fc727e2ae8e216b590f22cef
                                                      • Instruction ID: 790aeece71fcf200afd7c9324e1646546fc0ee4b2569f8f153279fac5a2f1af0
                                                      • Opcode Fuzzy Hash: 159d32df7d36a6c9e64a338db4b0faf782f6f3d8fc727e2ae8e216b590f22cef
                                                      • Instruction Fuzzy Hash: 083128B29082266FD7203F785DC483B7EACEA8534A715093FFA81F3281DA795D41466D
                                                      APIs
                                                      • OpenEventA.KERNEL32(00100002,00000000,00000000,03949DF0), ref: 02CB16C0
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CB16D5
                                                      • ResetEvent.KERNEL32(00000000,03949DF0), ref: 02CB16DF
                                                      • CloseHandle.KERNEL32(00000000,03949DF0), ref: 02CB1714
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,03949DF0), ref: 02CB178A
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CB179F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEventHandle$CreateOpenReset
                                                      • String ID:
                                                      • API String ID: 1285874450-0
                                                      • Opcode ID: 4805869a85b6974368092285c18b5333cdb9d0897604b4d9dad498f6bea0e213
                                                      • Instruction ID: 9ff4cb3c277f32ea246561c8d5f9ef6a9f6cc56ada6109e4424fd0518f43bd8b
                                                      • Opcode Fuzzy Hash: 4805869a85b6974368092285c18b5333cdb9d0897604b4d9dad498f6bea0e213
                                                      • Instruction Fuzzy Hash: D3414F70D04358AFDF11CFA5C858BEDB7B8EF45724F284619E419EB280D7709A05CB91
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA20AC
                                                      • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02CA20CD
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CA20D8
                                                      • InterlockedDecrement.KERNEL32(?), ref: 02CA213E
                                                      • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02CA217A
                                                      • InterlockedDecrement.KERNEL32(?), ref: 02CA2187
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CA21A6
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                      • String ID:
                                                      • API String ID: 1171374749-0
                                                      • Opcode ID: a62ddc91c2329d66c6958dcf2baaaa810c52c93986f267d6e9b772092801b171
                                                      • Instruction ID: d730f40f013ada1525e3d2bd8a7bc15832d26fbc7341458a7d63c482e1dc21a6
                                                      • Opcode Fuzzy Hash: a62ddc91c2329d66c6958dcf2baaaa810c52c93986f267d6e9b772092801b171
                                                      • Instruction Fuzzy Hash: AB412B715047029FC321DF25D894A6BBBF9FFC8668F144A1EF99682650D730E909CF92
                                                      APIs
                                                        • Part of subcall function 02CB1EE0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02CB173E,?,?), ref: 02CB1F0F
                                                        • Part of subcall function 02CB1EE0: CloseHandle.KERNEL32(00000000,?,?,02CB173E,?,?), ref: 02CB1F24
                                                        • Part of subcall function 02CB1EE0: SetEvent.KERNEL32(00000000,02CB173E,?,?), ref: 02CB1F37
                                                      • OpenEventA.KERNEL32(00100002,00000000,00000000,03949DF0), ref: 02CB16C0
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CB16D5
                                                      • ResetEvent.KERNEL32(00000000,03949DF0), ref: 02CB16DF
                                                      • CloseHandle.KERNEL32(00000000,03949DF0), ref: 02CB1714
                                                      • __CxxThrowException@8.LIBCMT ref: 02CB1745
                                                        • Part of subcall function 02CB456A: RaiseException.KERNEL32(?,?,02CAFB6A,?,?,?,?,?,?,?,02CAFB6A,?,02CD0F98,?), ref: 02CB45BF
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,03949DF0), ref: 02CB178A
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CB179F
                                                        • Part of subcall function 02CB1C20: GetCurrentProcessId.KERNEL32(?), ref: 02CB1C79
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,03949DF0), ref: 02CB17AF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                      • String ID:
                                                      • API String ID: 2227236058-0
                                                      • Opcode ID: 2e9a8aa30dd029b2f56d494b0b67861d7f4785ba5cbdaeeeb0a8b885b2999836
                                                      • Instruction ID: 5c413e0933d0fc820de58b010dd84ed1276822d836bafd9fdbffb838f0bc95c8
                                                      • Opcode Fuzzy Hash: 2e9a8aa30dd029b2f56d494b0b67861d7f4785ba5cbdaeeeb0a8b885b2999836
                                                      • Instruction Fuzzy Hash: 40317075D00318ABDF22CBE5CC58BEDB7B9EF45365F180229E81CEB280D7B09A158B51
                                                      APIs
                                                      • __init_pointers.LIBCMT ref: 02CB5DA4
                                                        • Part of subcall function 02CB8512: RtlEncodePointer.NTDLL(00000000), ref: 02CB8515
                                                        • Part of subcall function 02CB8512: __initp_misc_winsig.LIBCMT ref: 02CB8530
                                                        • Part of subcall function 02CB8512: GetModuleHandleW.KERNEL32(kernel32.dll,?,02CD1598,00000008,00000003,02CD0F7C,?,00000001), ref: 02CB9291
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02CB92A5
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02CB92B8
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02CB92CB
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02CB92DE
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02CB92F1
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02CB9304
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02CB9317
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02CB932A
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02CB933D
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02CB9350
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02CB9363
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02CB9376
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02CB9389
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02CB939C
                                                        • Part of subcall function 02CB8512: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02CB93AF
                                                      • __mtinitlocks.LIBCMT ref: 02CB5DA9
                                                      • __mtterm.LIBCMT ref: 02CB5DB2
                                                        • Part of subcall function 02CB5E1A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02CB8948
                                                        • Part of subcall function 02CB5E1A: _free.LIBCMT ref: 02CB894F
                                                        • Part of subcall function 02CB5E1A: RtlDeleteCriticalSection.NTDLL(02CD3978), ref: 02CB8971
                                                      • __calloc_crt.LIBCMT ref: 02CB5DD7
                                                      • __initptd.LIBCMT ref: 02CB5DF9
                                                      • GetCurrentThreadId.KERNEL32 ref: 02CB5E00
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                      • String ID:
                                                      • API String ID: 3567560977-0
                                                      • Opcode ID: 6b2045ee410820647094253b68bf4178a91433d732e97c5dd42e3f2a5c73a4bc
                                                      • Instruction ID: 15e0a89a164ea28e5dd05e2d1e1e59127e8f7ccc79b01dd117dfa8803081b7dc
                                                      • Opcode Fuzzy Hash: 6b2045ee410820647094253b68bf4178a91433d732e97c5dd42e3f2a5c73a4bc
                                                      • Instruction Fuzzy Hash: ECF0F0325AA3911AEA3A7BB8BC453DB378B9F027B0F600B29E461C60C0FF2484526D50
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02CB3483,00000000), ref: 02CB34EB
                                                      • GetProcAddress.KERNEL32(00000000), ref: 02CB34F2
                                                      • RtlEncodePointer.NTDLL(00000000), ref: 02CB34FE
                                                      • RtlDecodePointer.NTDLL(00000001), ref: 02CB351B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoInitialize$combase.dll
                                                      • API String ID: 3489934621-340411864
                                                      • Opcode ID: 8b378df04e7a97c265366c81bfd5aa6b5ad62b4dc4a13d9bb5b64dcb519a8b5a
                                                      • Instruction ID: 19880a24098377fa105d0c31605fd786d82c9c7d7d5c305eee3de9897d2452f1
                                                      • Opcode Fuzzy Hash: 8b378df04e7a97c265366c81bfd5aa6b5ad62b4dc4a13d9bb5b64dcb519a8b5a
                                                      • Instruction Fuzzy Hash: 5DE01A70ED1390AAEF211F71FC09B463B6DEB40702FB04A68F40AD1284CBB5A168CF54
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02CB34C0), ref: 02CB35C0
                                                      • GetProcAddress.KERNEL32(00000000), ref: 02CB35C7
                                                      • RtlEncodePointer.NTDLL(00000000), ref: 02CB35D2
                                                      • RtlDecodePointer.NTDLL(02CB34C0), ref: 02CB35ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoUninitialize$combase.dll
                                                      • API String ID: 3489934621-2819208100
                                                      • Opcode ID: 70dc0c3b66232c5f69d7a833f9b7defa8e1f784d896a545df37cd5b6eb147787
                                                      • Instruction ID: c96d4018e1821ecd700f58025505bebed07c3847ceb2ed117d0b2a8dd3d263d5
                                                      • Opcode Fuzzy Hash: 70dc0c3b66232c5f69d7a833f9b7defa8e1f784d896a545df37cd5b6eb147787
                                                      • Instruction Fuzzy Hash: F4E0B6B0DD2304ABEB115FA0BD0DB467A6DFB41705F708E64F106D1294DBB4A228CF98
                                                      APIs
                                                      • TlsGetValue.KERNEL32(00000029,03949DF0,?,?,?,?,00000000,02CC6AC8,000000FF,02CB21DA), ref: 02CB1F7A
                                                      • TlsSetValue.KERNEL32(00000029,02CB21DA,?,?,00000000), ref: 02CB1FE7
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02CB2011
                                                      • HeapFree.KERNEL32(00000000), ref: 02CB2014
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HeapValue$FreeProcess
                                                      • String ID:
                                                      • API String ID: 1812714009-0
                                                      • Opcode ID: fef5b6bd7334119327132f02a79fd13241d582587ad8f3229871b21865f9b6b5
                                                      • Instruction ID: 1a2b2ba10b42bf9436d01ffe2c5c4bb609675824b58d66c9aa7fbc03a4985204
                                                      • Opcode Fuzzy Hash: fef5b6bd7334119327132f02a79fd13241d582587ad8f3229871b21865f9b6b5
                                                      • Instruction Fuzzy Hash: C651D0719043049FDB22CF69D448B96BBE8FF89764F198659E81997280D731ED04CFD2
                                                      APIs
                                                      • _ValidateScopeTableHandlers.LIBCMT ref: 02CC57A0
                                                      • __FindPESection.LIBCMT ref: 02CC57BA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FindHandlersScopeSectionTableValidate
                                                      • String ID:
                                                      • API String ID: 876702719-0
                                                      • Opcode ID: 89b2dd2fade313a2df6febdd5370cb57beeb74f504ade3a51a5c0e7e57d3334f
                                                      • Instruction ID: 2939e75e0c35b1fe59e42eebe7b39be29b8ae6fd02ad9cd5ee475a602d986fed
                                                      • Opcode Fuzzy Hash: 89b2dd2fade313a2df6febdd5370cb57beeb74f504ade3a51a5c0e7e57d3334f
                                                      • Instruction Fuzzy Hash: 23A1AA71E416158FDB24CF69C880BA9B7A5EB843A4FB446ADD805FB341E730F942CB90
                                                      APIs
                                                      • GetStringTypeW.KERNEL32(00000001,00408660,00000001,00000000,00000103,00000001,00000000,00406687,00200020,00000000,?,00000000,00000000,00000001), ref: 00406ABD
                                                      • GetStringTypeA.KERNEL32(00000000,00000001,0040865C,00000001,?,?,00000000,00000000,00000001), ref: 00406AD7
                                                      • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406687,00200020,00000000,?,00000000,00000000,00000001), ref: 00406B0B
                                                      • MultiByteToWideChar.KERNEL32(00406687,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406687,00200020,00000000,?,00000000,00000000,00000001), ref: 00406B43
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406B99
                                                      • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406BAB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: StringType$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 3852931651-0
                                                      • Opcode ID: 87656d5370fc576a8e6cd5d6e170880e59467c9da7e5d9967f5ecfdf1b54f734
                                                      • Instruction ID: 5dca88ec0d3eb0aaa80f1ff7b452f14d5bb971dbdefcfa103bb381dac7bd3929
                                                      • Opcode Fuzzy Hash: 87656d5370fc576a8e6cd5d6e170880e59467c9da7e5d9967f5ecfdf1b54f734
                                                      • Instruction Fuzzy Hash: E5416171600219AFCF119F94DE85EAB3FB9FB04750F11453AF912F2290D7799A20CB99
                                                      APIs
                                                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02CA1CB1
                                                      • CloseHandle.KERNEL32(?), ref: 02CA1CBA
                                                      • InterlockedExchangeAdd.KERNEL32(02CD727C,00000000), ref: 02CA1CC6
                                                      • TerminateThread.KERNEL32(?,00000000), ref: 02CA1CD4
                                                      • QueueUserAPC.KERNEL32(02CA1E7C,?,00000000), ref: 02CA1CE1
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02CA1CEC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                      • String ID:
                                                      • API String ID: 1946104331-0
                                                      • Opcode ID: e517bb71671de38ec53b96c76c9d21a1f3a457fc6aea670e29f3bd055f23a799
                                                      • Instruction ID: 1491819a4bcc5c638bbb8123a07a96b98dd19d7e385909eda476c47230e03bb2
                                                      • Opcode Fuzzy Hash: e517bb71671de38ec53b96c76c9d21a1f3a457fc6aea670e29f3bd055f23a799
                                                      • Instruction Fuzzy Hash: 12F08C31940615BFDB205B96ED0DE5BFBBCEB89730B10475AF52A82190DBB0A914CFA0
                                                      APIs
                                                      • GetVersionExA.KERNEL32 ref: 0040423B
                                                      • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00404270
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004042D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentFileModuleNameVariableVersion
                                                      • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                      • API String ID: 1385375860-4131005785
                                                      • Opcode ID: 58ca66314c6e6523d112f31b40a161e639e5c5e5cc0c8fdd41d9b20179a014b4
                                                      • Instruction ID: 184f5ec9f4f2d3f1b3927cee5de0cd4e268266450d658ca507bd0ab58eaf7eeb
                                                      • Opcode Fuzzy Hash: 58ca66314c6e6523d112f31b40a161e639e5c5e5cc0c8fdd41d9b20179a014b4
                                                      • Instruction Fuzzy Hash: 683139F1A012986DEB3196705C52BDE37689B82344F2450FFEB85F62C2D6388E89C719
                                                      APIs
                                                      • std::exception::exception.LIBCMT ref: 02CB198F
                                                        • Part of subcall function 02CB24E3: std::exception::_Copy_str.LIBCMT ref: 02CB24FC
                                                        • Part of subcall function 02CB0D60: __CxxThrowException@8.LIBCMT ref: 02CB0DBE
                                                      • std::exception::exception.LIBCMT ref: 02CB19EE
                                                      Strings
                                                      • boost unique_lock owns already the mutex, xrefs: 02CB19DD
                                                      • $, xrefs: 02CB19F3
                                                      • boost unique_lock has no mutex, xrefs: 02CB197E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                      • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                      • API String ID: 2140441600-46888669
                                                      • Opcode ID: a0cc478f4ab02ca762f5c7c95386ae79e8347e41eebe4595b52ad79ab2825219
                                                      • Instruction ID: ad8ad5c08e39fef488437cf510bc7b2c560451ab870391859253fa6908d65bbf
                                                      • Opcode Fuzzy Hash: a0cc478f4ab02ca762f5c7c95386ae79e8347e41eebe4595b52ad79ab2825219
                                                      • Instruction Fuzzy Hash: 2A2106B15087809FD726DF24C55479BBBE5BF88B08F504A5DF4A587280D7B5E408CF92
                                                      APIs
                                                      • __getptd_noexit.LIBCMT ref: 02CB4A90
                                                        • Part of subcall function 02CB5C82: GetLastError.KERNEL32(76F90A60,76F8F550,02CB5E70,02CB3043,76F8F550,?,02CA606D,00000104,76F90A60,76F8F550,ntdll.dll,?,?,?,02CA6508), ref: 02CB5C84
                                                        • Part of subcall function 02CB5C82: __calloc_crt.LIBCMT ref: 02CB5CA5
                                                        • Part of subcall function 02CB5C82: __initptd.LIBCMT ref: 02CB5CC7
                                                        • Part of subcall function 02CB5C82: GetCurrentThreadId.KERNEL32 ref: 02CB5CCE
                                                        • Part of subcall function 02CB5C82: SetLastError.KERNEL32(00000000,02CA606D,00000104,76F90A60,76F8F550,ntdll.dll,?,?,?,02CA6508), ref: 02CB5CE6
                                                      • __calloc_crt.LIBCMT ref: 02CB4AB3
                                                      • __get_sys_err_msg.LIBCMT ref: 02CB4AD1
                                                      • __invoke_watson.LIBCMT ref: 02CB4AEE
                                                      Strings
                                                      • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 02CB4A9B, 02CB4AC1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                      • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                      • API String ID: 109275364-798102604
                                                      • Opcode ID: a4cc1113450f0172fe61339d3831e9f2436ea1c0ec40ddb8f5540f8a54d39529
                                                      • Instruction ID: 7133fca27dc9bb3cee470228f20011361953820244d28a34fac86e778de90028
                                                      • Opcode Fuzzy Hash: a4cc1113450f0172fe61339d3831e9f2436ea1c0ec40ddb8f5540f8a54d39529
                                                      • Instruction Fuzzy Hash: B3F050325C87107BEA37A51A5C606EB729DDF82FA1F100225F94496203E731CD007698
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2350
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2360
                                                      • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02CA2370
                                                      • GetLastError.KERNEL32 ref: 02CA237A
                                                        • Part of subcall function 02CA1712: __EH_prolog.LIBCMT ref: 02CA1717
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                      • String ID: pqcs
                                                      • API String ID: 1619523792-2559862021
                                                      • Opcode ID: a1e3fce1ef800c170ae30ed1b7fd36591c3f831bdf05686adafc8b9042b0a4da
                                                      • Instruction ID: ac0bed9c2fdeefb6a3d1383df57e7b423158e48f98a6595c0ab284e5a5d5733e
                                                      • Opcode Fuzzy Hash: a1e3fce1ef800c170ae30ed1b7fd36591c3f831bdf05686adafc8b9042b0a4da
                                                      • Instruction Fuzzy Hash: C0F05470940305AFDB20AFB49819BABBBACEF41615F104669E809D3140F7B1DA149B91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA4035
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 02CA4042
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 02CA4049
                                                      • std::exception::exception.LIBCMT ref: 02CA4063
                                                        • Part of subcall function 02CAA6D5: __EH_prolog.LIBCMT ref: 02CAA6DA
                                                        • Part of subcall function 02CAA6D5: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02CAA6E9
                                                        • Part of subcall function 02CAA6D5: __CxxThrowException@8.LIBCMT ref: 02CAA708
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                      • String ID: bad allocation
                                                      • API String ID: 3112922283-2104205924
                                                      • Opcode ID: faaec31e5241737637447e7b301376a7ec11f69c976b9c2be3d73aad80f0d458
                                                      • Instruction ID: 39857b7ffb317bfeb240e5da5e3913083d52156c0150dfcfadd0f4f143445bcf
                                                      • Opcode Fuzzy Hash: faaec31e5241737637447e7b301376a7ec11f69c976b9c2be3d73aad80f0d458
                                                      • Instruction Fuzzy Hash: 01F082B1D40609DBCB00EFE0C918BEFBB7CEB04355F50454DE915A2240DB349219DF91
                                                      APIs
                                                      • GetStartupInfoA.KERNEL32(?), ref: 0040409D
                                                      • GetFileType.KERNEL32(00000800), ref: 00404143
                                                      • GetStdHandle.KERNEL32(-000000F6), ref: 0040419C
                                                      • GetFileType.KERNEL32(00000000), ref: 004041AA
                                                      • SetHandleCount.KERNEL32 ref: 004041E1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: FileHandleType$CountInfoStartup
                                                      • String ID:
                                                      • API String ID: 1710529072-0
                                                      • Opcode ID: 7f5c55e8d81f6b32aec7bc847641905ebf7eddea7c89c5663b0c5dae59e1758a
                                                      • Instruction ID: c2fa14b46fa330a95339d6411410d8ce355079c290cfc5157990d8cdaf1916e9
                                                      • Opcode Fuzzy Hash: 7f5c55e8d81f6b32aec7bc847641905ebf7eddea7c89c5663b0c5dae59e1758a
                                                      • Instruction Fuzzy Hash: 8B512CB16046118BD7208B38CD887577B90ABA1325F15473EDA96FF3E1C738D889C719
                                                      APIs
                                                        • Part of subcall function 02CB1A60: CloseHandle.KERNEL32(00000000,03949DF0), ref: 02CB1AB1
                                                        • Part of subcall function 02CB1A60: WaitForSingleObject.KERNEL32(?,000000FF,03949DF0,?,?,?,?,03949DF0,02CB1A33,03949DF0), ref: 02CB1AC8
                                                      • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02CB1D2E
                                                      • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02CB1D4E
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02CB1D87
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02CB1DDB
                                                      • SetEvent.KERNEL32(?), ref: 02CB1DE2
                                                        • Part of subcall function 02CA418C: CloseHandle.KERNEL32(00000000,?,02CB1D15), ref: 02CA41B0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                      • String ID:
                                                      • API String ID: 4166353394-0
                                                      • Opcode ID: c4de86c711bc0c31cd15f2b80cc3bc25b0057c722b64b13c57aa047063b5f6c5
                                                      • Instruction ID: 18376bb66a542858653c9bb672c530b1b3caac0b497f14166dd4b683f2ee6244
                                                      • Opcode Fuzzy Hash: c4de86c711bc0c31cd15f2b80cc3bc25b0057c722b64b13c57aa047063b5f6c5
                                                      • Instruction Fuzzy Hash: 9A41D2326403018BDF279F29CC9079777A8EF85724F280668EC19DB295D774D912CB91
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA20AC
                                                      • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02CA20CD
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CA20D8
                                                      • InterlockedDecrement.KERNEL32(?), ref: 02CA213E
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CA21A6
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                      • String ID:
                                                      • API String ID: 1611172436-0
                                                      • Opcode ID: 08027ea886989eef3eb013757375a528344c8fa46e512f1f425772b76ca8a390
                                                      • Instruction ID: faa4d4a0975b402b51ddf970a58fe0bba018ac98867a74265aa3f2c4cd118101
                                                      • Opcode Fuzzy Hash: 08027ea886989eef3eb013757375a528344c8fa46e512f1f425772b76ca8a390
                                                      • Instruction Fuzzy Hash: 7A317C715047029FC321DF25C895A6BB7F9FFC8668F140A1EE99683650D730E90ACF92
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CAE108
                                                        • Part of subcall function 02CA1A01: TlsGetValue.KERNEL32 ref: 02CA1A0A
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CAE187
                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 02CAE1A3
                                                      • InterlockedIncrement.KERNEL32(02CD5190), ref: 02CAE1C8
                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 02CAE1DD
                                                        • Part of subcall function 02CA27F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02CA284E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                      • String ID:
                                                      • API String ID: 1578506061-0
                                                      • Opcode ID: e5b474c50a22db8c6896a5a6e2ca55a4d2b7f91a642c25fd3b2f0eb589381e50
                                                      • Instruction ID: ed9a678be2acd234f44411e0d76bedd33cb1a774a38ed67dba82385ec280de7a
                                                      • Opcode Fuzzy Hash: e5b474c50a22db8c6896a5a6e2ca55a4d2b7f91a642c25fd3b2f0eb589381e50
                                                      • Instruction Fuzzy Hash: C73157B1D002159FCB10DFA8C944AAEBBF9FF48314F14456EE849E7601E734AA04CFA0
                                                      APIs
                                                      • _malloc.LIBCMT ref: 02CC03C0
                                                        • Part of subcall function 02CB2FBC: __FF_MSGBANNER.LIBCMT ref: 02CB2FD3
                                                        • Part of subcall function 02CB2FBC: __NMSG_WRITE.LIBCMT ref: 02CB2FDA
                                                        • Part of subcall function 02CB2FBC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02CB2FFF
                                                      • _free.LIBCMT ref: 02CC03D3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap_free_malloc
                                                      • String ID:
                                                      • API String ID: 1020059152-0
                                                      • Opcode ID: 046533c002c30083225fa8919dec86147522fce4b39bce8a5d1d41a5874abab5
                                                      • Instruction ID: 54e3f41aa343fbd17e2b0d9cbfd7174d8b9ee9310391374bfeead5a2c2bb322e
                                                      • Opcode Fuzzy Hash: 046533c002c30083225fa8919dec86147522fce4b39bce8a5d1d41a5874abab5
                                                      • Instruction Fuzzy Hash: 9211C632D44615EFCF226FB4A84879B379D9F443A1F34462DEA09DA190DB38CA50DB91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA21DA
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CA21ED
                                                      • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02CA2224
                                                      • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02CA2237
                                                      • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02CA2261
                                                        • Part of subcall function 02CA2341: InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2350
                                                        • Part of subcall function 02CA2341: InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2360
                                                        • Part of subcall function 02CA2341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02CA2370
                                                        • Part of subcall function 02CA2341: GetLastError.KERNEL32 ref: 02CA237A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 1856819132-0
                                                      • Opcode ID: 82fb7aa7ae4160306c0d77c0d1663ab05d73e44746ae2faebc5c92c032d3736c
                                                      • Instruction ID: d8787311a098c2a754cb3ead359b255e27e53566f3a4d4c02db7ddade3364b77
                                                      • Opcode Fuzzy Hash: 82fb7aa7ae4160306c0d77c0d1663ab05d73e44746ae2faebc5c92c032d3736c
                                                      • Instruction Fuzzy Hash: F3117CB2D4012AEBCB119FA9D8147AEFFBAFF44324F10461AE815E22A0D7314A55DF91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA229D
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CA22B0
                                                      • TlsGetValue.KERNEL32 ref: 02CA22E7
                                                      • TlsSetValue.KERNEL32(?), ref: 02CA2300
                                                      • TlsSetValue.KERNEL32(?,?,?), ref: 02CA231C
                                                        • Part of subcall function 02CA2341: InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2350
                                                        • Part of subcall function 02CA2341: InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2360
                                                        • Part of subcall function 02CA2341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02CA2370
                                                        • Part of subcall function 02CA2341: GetLastError.KERNEL32 ref: 02CA237A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 1856819132-0
                                                      • Opcode ID: 5018cc25a4c3d9ac4e6688d454e32317829b50d88882709f7bc2de43e9b66377
                                                      • Instruction ID: 7ae4a814954b69862c477a36310be7faf9b6a245af03fff775f8bb3a4a2f905d
                                                      • Opcode Fuzzy Hash: 5018cc25a4c3d9ac4e6688d454e32317829b50d88882709f7bc2de43e9b66377
                                                      • Instruction Fuzzy Hash: 3C118BB2D01229EBCB029FA5DC00AAEFFBAFF58310F10452AE804E3250D7314A25DF91
                                                      APIs
                                                        • Part of subcall function 02CAB170: __EH_prolog.LIBCMT ref: 02CAB175
                                                      • __CxxThrowException@8.LIBCMT ref: 02CABD3A
                                                        • Part of subcall function 02CB456A: RaiseException.KERNEL32(?,?,02CAFB6A,?,?,?,?,?,?,?,02CAFB6A,?,02CD0F98,?), ref: 02CB45BF
                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02CD1DB4,?,00000001), ref: 02CABD50
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CABD63
                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02CD1DB4,?,00000001), ref: 02CABD73
                                                      • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02CABD81
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                      • String ID:
                                                      • API String ID: 2725315915-0
                                                      • Opcode ID: 19d9815812adb5e9e356f9692c5e9cb969c14caa69b03e2d51ed51634a47e24f
                                                      • Instruction ID: 4834bbdf799e4ed9ace29c49189d64b206f2212660d5581fd6caede7972ee5d3
                                                      • Opcode Fuzzy Hash: 19d9815812adb5e9e356f9692c5e9cb969c14caa69b03e2d51ed51634a47e24f
                                                      • Instruction Fuzzy Hash: 550181B6A40305AFDB109AE4DC89F86BBADEB04369F104615F626D7190D765EC888B60
                                                      APIs
                                                      • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02CA2432
                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02CA2445
                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 02CA2454
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2469
                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 02CA2470
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 747265849-0
                                                      • Opcode ID: 7cac288c3345d4b588273a67b64f1ff6984ba683e79153b4c5340bd734a52738
                                                      • Instruction ID: 41823847cd26b410427f98a22bade51a1c78d244b9f757d72413e1cb5886eb29
                                                      • Opcode Fuzzy Hash: 7cac288c3345d4b588273a67b64f1ff6984ba683e79153b4c5340bd734a52738
                                                      • Instruction Fuzzy Hash: FFF03072640215BFD7009BA0ED49FDAB72CFB44725F904511F701D6480D761A925CFE5
                                                      APIs
                                                      • InterlockedIncrement.KERNEL32(?), ref: 02CA1ED2
                                                      • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02CA1EEA
                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 02CA1EF9
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA1F0E
                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 02CA1F15
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 830998967-0
                                                      • Opcode ID: 37014e631195aaced58457aad6b8afd2b023af4f56153afe729cf11b7c243bae
                                                      • Instruction ID: cb2be62d8367153b249298e4703ae8be882a9ac209bcfed2b491145c21267d7d
                                                      • Opcode Fuzzy Hash: 37014e631195aaced58457aad6b8afd2b023af4f56153afe729cf11b7c243bae
                                                      • Instruction Fuzzy Hash: A1F01772641605BBDB00AFA1ED88FDABB2DFF44765F100516F60186440DB61AA698FE0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: AllocGlobal
                                                      • String ID: et-I$rope$rty $temP
                                                      • API String ID: 3761449716-1287247900
                                                      • Opcode ID: bc3dadcc3ebf5a90b1555ec177b6e1ae89448e9ec92b0551aced77eee8506cf3
                                                      • Instruction ID: e84a0141946ce6018126de795dc0789c073a132d3876e2db5109b28c5bc68091
                                                      • Opcode Fuzzy Hash: bc3dadcc3ebf5a90b1555ec177b6e1ae89448e9ec92b0551aced77eee8506cf3
                                                      • Instruction Fuzzy Hash: BDE08CB0400B42DBC320CF21C954546BFF4FB04B50B00CA2EE8D65B760C3B4A2898F00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: invalid string position$string too long
                                                      • API String ID: 4104443479-4289949731
                                                      • Opcode ID: 8d02febaa82aa923963e103f168e0b2e073558a5c79cb97236051aa12affdece
                                                      • Instruction ID: fc56249fa4c825492c85b2176c0dfa8ed7eb4e2d0876627f13ba59826cca8b39
                                                      • Opcode Fuzzy Hash: 8d02febaa82aa923963e103f168e0b2e073558a5c79cb97236051aa12affdece
                                                      • Instruction Fuzzy Hash: 7A41D4717003069BD734DE69DCA4A6AB7BAEF8075CB140A2DF856C7780CB70E905CBA0
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000), ref: 02CA30C3
                                                      • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02CA3102
                                                      • _memcmp.LIBCMT ref: 02CA3141
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressErrorLastString_memcmp
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 1618111833-2422070025
                                                      • Opcode ID: 65fadc7d61318dbd75ea5bc040a2856ccf9b5f032c76c47c8fd04712301f9840
                                                      • Instruction ID: 334c69b076384dc2be86beb9b9bbb48897812ca68b1bb8e76a288104336ac6d4
                                                      • Opcode Fuzzy Hash: 65fadc7d61318dbd75ea5bc040a2856ccf9b5f032c76c47c8fd04712301f9840
                                                      • Instruction Fuzzy Hash: 2D31E472A0034A9FDF219F74CCA07AEB7B5EF85328F1045A9ED559B280E7719A41CF90
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA1F5B
                                                      • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02CA1FC5
                                                      • GetLastError.KERNEL32(?,00000000), ref: 02CA1FD2
                                                        • Part of subcall function 02CA1712: __EH_prolog.LIBCMT ref: 02CA1717
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$CompletionCreateErrorLastPort
                                                      • String ID: iocp
                                                      • API String ID: 998023749-976528080
                                                      • Opcode ID: 2fd488e9a07e61e4854b168df7807c152a30a2025aee6237035b6906cf3665ae
                                                      • Instruction ID: 2c274839847d9b1351bc9766c6ccef03db98ffc59c4f811f8a89c6271b0e8ad4
                                                      • Opcode Fuzzy Hash: 2fd488e9a07e61e4854b168df7807c152a30a2025aee6237035b6906cf3665ae
                                                      • Instruction Fuzzy Hash: 7721C8B1901B459FC720DF6AD54455BFBF8FF94720B108A1FE4A693A50D7B0A604CF91
                                                      APIs
                                                      • _malloc.LIBCMT ref: 02CB3B74
                                                        • Part of subcall function 02CB2FBC: __FF_MSGBANNER.LIBCMT ref: 02CB2FD3
                                                        • Part of subcall function 02CB2FBC: __NMSG_WRITE.LIBCMT ref: 02CB2FDA
                                                        • Part of subcall function 02CB2FBC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02CB2FFF
                                                      • std::exception::exception.LIBCMT ref: 02CB3B92
                                                      • __CxxThrowException@8.LIBCMT ref: 02CB3BA7
                                                        • Part of subcall function 02CB456A: RaiseException.KERNEL32(?,?,02CAFB6A,?,?,?,?,?,?,?,02CAFB6A,?,02CD0F98,?), ref: 02CB45BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                      • String ID: bad allocation
                                                      • API String ID: 3074076210-2104205924
                                                      • Opcode ID: 1ce0c6d43ae06d18ded4a6bdcbc1671884472405f530acb113cf95c03bf4c89f
                                                      • Instruction ID: 1e4d4f0592e3f3f85cf6cdc019f815aca7da9e495a31c21ec94a4275b4567813
                                                      • Opcode Fuzzy Hash: 1ce0c6d43ae06d18ded4a6bdcbc1671884472405f530acb113cf95c03bf4c89f
                                                      • Instruction Fuzzy Hash: A2E0657494060DAADF16FEA4CC19DEFB76EAF01310F5046D9DC1466190DB719B04DAD1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA37B6
                                                      • __localtime64.LIBCMT ref: 02CA37C1
                                                        • Part of subcall function 02CB2610: __gmtime64_s.LIBCMT ref: 02CB2623
                                                      • std::exception::exception.LIBCMT ref: 02CA37D9
                                                        • Part of subcall function 02CB24E3: std::exception::_Copy_str.LIBCMT ref: 02CB24FC
                                                        • Part of subcall function 02CAA533: __EH_prolog.LIBCMT ref: 02CAA538
                                                        • Part of subcall function 02CAA533: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02CAA547
                                                        • Part of subcall function 02CAA533: __CxxThrowException@8.LIBCMT ref: 02CAA566
                                                      Strings
                                                      • could not convert calendar time to UTC time, xrefs: 02CA37CE
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                      • String ID: could not convert calendar time to UTC time
                                                      • API String ID: 1963798777-2088861013
                                                      • Opcode ID: 6d7b46e75563b3a11ebda4af942b971afb5c987cdb7754b54cfcd5ae42c765d9
                                                      • Instruction ID: 1d6d7fdbb6ca61150c9769084f232767e359eb3a03b3d9db137dab7aed29f108
                                                      • Opcode Fuzzy Hash: 6d7b46e75563b3a11ebda4af942b971afb5c987cdb7754b54cfcd5ae42c765d9
                                                      • Instruction Fuzzy Hash: CAE06DB1D0020A9ACF01EFA4DD107EFBBB9EF04315F904599D815A2640DB345616DF95
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32,004031DA), ref: 004034CF
                                                      • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 004034DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: IsProcessorFeaturePresent$KERNEL32
                                                      • API String ID: 1646373207-3105848591
                                                      • Opcode ID: 9e3184260247bb682de86deda7832bfa8ed340def0682ebd0b0602d774616e76
                                                      • Instruction ID: 898d93880d4485db41e7873eaf179ed41bca6e5ae6807f0673dee1401ec4111e
                                                      • Opcode Fuzzy Hash: 9e3184260247bb682de86deda7832bfa8ed340def0682ebd0b0602d774616e76
                                                      • Instruction Fuzzy Hash: E7C01260380A0166EAB12FB20F09B2A290C0B00B03F10407EA689F80C0CE7DC600802D
                                                      APIs
                                                      • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,004043AA), ref: 00404FAD
                                                      • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,004043AA), ref: 00404FD1
                                                      • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,004043AA), ref: 00404FEB
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,004043AA), ref: 004050AC
                                                      • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,004043AA), ref: 004050C3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual$FreeHeap
                                                      • String ID:
                                                      • API String ID: 714016831-0
                                                      • Opcode ID: f1e65f67fdbfd5f1cb6a1da9da0650b6d82232d347ff9b2b09204e151c2c29bb
                                                      • Instruction ID: a7f23685012a0bc72c2a0b99c88b2486a7fce89ecdb7f3ca743dcf13c059541f
                                                      • Opcode Fuzzy Hash: f1e65f67fdbfd5f1cb6a1da9da0650b6d82232d347ff9b2b09204e151c2c29bb
                                                      • Instruction Fuzzy Hash: BA31CF70641B029BD3308F24DE45B2BB7A4EB88754F10863AE955B72E1E778A844CF9C
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AdjustPointer_memmove
                                                      • String ID:
                                                      • API String ID: 1721217611-0
                                                      • Opcode ID: 1f1ee43e8f9d3a68e5cbf38bc073e22f01a62f2ff8a164877d25ee215b017992
                                                      • Instruction ID: 69a2fabd5fc87c23da030b3d1923c58288495433f206406bfdbfea661463d396
                                                      • Opcode Fuzzy Hash: 1f1ee43e8f9d3a68e5cbf38bc073e22f01a62f2ff8a164877d25ee215b017992
                                                      • Instruction Fuzzy Hash: D741AB756043035EEB265F29D840BFA37E99F85754F28006FE849961E1DFB1E784EE10
                                                      APIs
                                                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02CA4149), ref: 02CB13CF
                                                        • Part of subcall function 02CA3FDC: __EH_prolog.LIBCMT ref: 02CA3FE1
                                                        • Part of subcall function 02CA3FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02CA3FF3
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CB13C4
                                                      • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02CA4149), ref: 02CB1410
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02CA4149), ref: 02CB14E1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$Event$CreateH_prolog
                                                      • String ID:
                                                      • API String ID: 2825413587-0
                                                      • Opcode ID: c6b34eabf949e397268c9ea2e168a7b3c5ea57aa040eaa38b127ac37daaa572b
                                                      • Instruction ID: f6f44eb8d1a3c77a9142c197f329d4a80f048cc4b17d548c1abae1a94d29b4b9
                                                      • Opcode Fuzzy Hash: c6b34eabf949e397268c9ea2e168a7b3c5ea57aa040eaa38b127ac37daaa572b
                                                      • Instruction Fuzzy Hash: 0A5191716003458BDF12DF28C89479A7BE4FF88328F194668F86D97290E775E905CF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                      • String ID:
                                                      • API String ID: 2782032738-0
                                                      • Opcode ID: 74fd7ae48c8e0e00c31eaba1fa6ec470c5178f0af37b8486f0187a5ad7048a98
                                                      • Instruction ID: 4d121c73b109d1b58bb76d15c5787d1a3fc804a851d649f4a833c56011337f5b
                                                      • Opcode Fuzzy Hash: 74fd7ae48c8e0e00c31eaba1fa6ec470c5178f0af37b8486f0187a5ad7048a98
                                                      • Instruction Fuzzy Hash: 3941F675B007869BDF1A8EA9C8905EE7BAAEF84354F1481BEE805C7680D772DE41CB41
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02CBFF5B
                                                      • __isleadbyte_l.LIBCMT ref: 02CBFF89
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02CBFFB7
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02CBFFED
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: c21d59ca886245e399d62648a0a9fd149f813fc3f37670627b85a0ea7d66674b
                                                      • Instruction ID: 68bdc3cfab430e7e6b6af2a5a722539e7fc816993c943dd4d31cf837098c8c0d
                                                      • Opcode Fuzzy Hash: c21d59ca886245e399d62648a0a9fd149f813fc3f37670627b85a0ea7d66674b
                                                      • Instruction Fuzzy Hash: D131EF31A00246AFDB228E75CC48BAA7BEAFF82324F15406DF864C7690D732D950DB90
                                                      APIs
                                                      • htons.WS2_32(?), ref: 02CA3DA2
                                                        • Part of subcall function 02CA3BD3: __EH_prolog.LIBCMT ref: 02CA3BD8
                                                        • Part of subcall function 02CA3BD3: std::bad_exception::bad_exception.LIBCMT ref: 02CA3BED
                                                      • htonl.WS2_32(00000000), ref: 02CA3DB9
                                                      • htonl.WS2_32(00000000), ref: 02CA3DC0
                                                      • htons.WS2_32(?), ref: 02CA3DD4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                      • String ID:
                                                      • API String ID: 3882411702-0
                                                      • Opcode ID: 6bb7c5d0569bbafe8a4ffd78efb9805c4ae21541b7703d1afdb295e11334db14
                                                      • Instruction ID: 5f5f83cdd4d36b376230767e4b750e499928aa50a25496af4a062250de237f85
                                                      • Opcode Fuzzy Hash: 6bb7c5d0569bbafe8a4ffd78efb9805c4ae21541b7703d1afdb295e11334db14
                                                      • Instruction Fuzzy Hash: 3611CE35A00249EFCF019F64D899A9AB7B9EF08314F108496FC08DF204D6719A18CBA1
                                                      APIs
                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02CA23D0
                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 02CA23DE
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA2401
                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 02CA2408
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 4018804020-0
                                                      • Opcode ID: 997b2db4d40aa9a9c2e0e4b65947c741cd1e93d3c046ae3f91605edc613cd784
                                                      • Instruction ID: d35a49bed6c0920a2c71aba7ffe8f58820af4fbbe84645cfa4493163d8c42e09
                                                      • Opcode Fuzzy Hash: 997b2db4d40aa9a9c2e0e4b65947c741cd1e93d3c046ae3f91605edc613cd784
                                                      • Instruction Fuzzy Hash: 3511CE31600306ABDB209F60D994B6ABBBDFF41718F20446DFA019B100D7B2E955CFA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: 9fb97c94805de79712bc4b19b374b35feed1594a5f1a6597471dc43fcfe1d45b
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: 7B01333604014ABFCF136E84DC018EE3F22BF58358F488426FA6859120D337CAB2AB81
                                                      APIs
                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02CA24A9
                                                      • RtlEnterCriticalSection.NTDLL(?), ref: 02CA24B8
                                                      • InterlockedExchange.KERNEL32(?,00000001), ref: 02CA24CD
                                                      • RtlLeaveCriticalSection.NTDLL(?), ref: 02CA24D4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 4018804020-0
                                                      • Opcode ID: 113ee22b3cc80cc0ca444ad03bbf81dc27893dc80f04e0c2b769273c6d6f21c6
                                                      • Instruction ID: dcffe14c3ae5872db2df7272465be5261fc9af9e6316b685afb45258dec3ff4a
                                                      • Opcode Fuzzy Hash: 113ee22b3cc80cc0ca444ad03bbf81dc27893dc80f04e0c2b769273c6d6f21c6
                                                      • Instruction Fuzzy Hash: ACF03C72540205AFDB009F69E844F9ABBACFF48720F104519FA04CA141D771E5648FA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA2009
                                                      • RtlDeleteCriticalSection.NTDLL(?), ref: 02CA2028
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CA2037
                                                      • CloseHandle.KERNEL32(00000000), ref: 02CA204E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                      • String ID:
                                                      • API String ID: 2456309408-0
                                                      • Opcode ID: a9450cd21112c3c73cf7ff7e04cacddcb9ad67eb0be15a3d14aaca442bd0e489
                                                      • Instruction ID: 528721af47e806c8cfb7db99ebf2183a39568fc11863ff02b724a5ee9fc1e00f
                                                      • Opcode Fuzzy Hash: a9450cd21112c3c73cf7ff7e04cacddcb9ad67eb0be15a3d14aaca442bd0e489
                                                      • Instruction Fuzzy Hash: 7401F471800755DFC3349F64E918B9AFBF9FF04309F104A6DE84692990C770A648CF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Event$H_prologSleep
                                                      • String ID:
                                                      • API String ID: 1765829285-0
                                                      • Opcode ID: 11d63a95c24b9ef0efbc1524cbcb3f9475901269d4fa9b05de953c7510191abf
                                                      • Instruction ID: dd64805df5615bfe94cb722b68490906ac2d5891a8b6d38e0a0790e487325c46
                                                      • Opcode Fuzzy Hash: 11d63a95c24b9ef0efbc1524cbcb3f9475901269d4fa9b05de953c7510191abf
                                                      • Instruction Fuzzy Hash: CAF05435640110DFCB00DF95D8C8B98BBA4FF0D321F6082A9F519DB290C7359854CF91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmove
                                                      • String ID: &'
                                                      • API String ID: 3529519853-655172784
                                                      • Opcode ID: 6f059a3390540f0c66101a0993483a37413e3dcd1def1a2f55ae5a0c6e5b5466
                                                      • Instruction ID: c373ac0618110e89fe5d32e395d74c2224f98e6674e6dba0caf6a1cd6fa09922
                                                      • Opcode Fuzzy Hash: 6f059a3390540f0c66101a0993483a37413e3dcd1def1a2f55ae5a0c6e5b5466
                                                      • Instruction Fuzzy Hash: 84618071D0030ADFCF20DFA4C961AEDFBB5AF48318F14816AD509AB150E7719A45DFA1
                                                      APIs
                                                      • GetCPInfo.KERNEL32(?,00000000), ref: 004063B3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: Info
                                                      • String ID: $
                                                      • API String ID: 1807457897-3032137957
                                                      • Opcode ID: a7f3197f69078d42aea810566aa5413c4cc4e987de3c304b03698a2edaada33c
                                                      • Instruction ID: 8c55b24d83960f1fa11b83fcbaff02b2a5c71f0a1905284ffb67a28f23df5d26
                                                      • Opcode Fuzzy Hash: a7f3197f69078d42aea810566aa5413c4cc4e987de3c304b03698a2edaada33c
                                                      • Instruction Fuzzy Hash: B1417A31000258AAEB219B18DD89BFB3FE8EB06710F1501F6D646F71D2C33949689F6E
                                                      APIs
                                                      • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02CA83DE,?,?,00000000), ref: 02CA96DB
                                                      • getsockname.WS2_32(?,?,?), ref: 02CA96F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastgetsockname
                                                      • String ID: &'
                                                      • API String ID: 566540725-655172784
                                                      • Opcode ID: bb9f6b686227f818c01a409b0f1af0b59647796f8994b2f14d0554c8eb48f1c0
                                                      • Instruction ID: 02fab1399348e060687e600f3b23c5650f8d37f91bbeb4f8804d0ebd8ceb1057
                                                      • Opcode Fuzzy Hash: bb9f6b686227f818c01a409b0f1af0b59647796f8994b2f14d0554c8eb48f1c0
                                                      • Instruction Fuzzy Hash: FF215172A00209DFDB10DF68D855ADEFBF5FF48324F11856AE918EB281E730E9458B50
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CACCBF
                                                        • Part of subcall function 02CAD29B: std::exception::exception.LIBCMT ref: 02CAD2CA
                                                        • Part of subcall function 02CADA51: __EH_prolog.LIBCMT ref: 02CADA56
                                                        • Part of subcall function 02CB3B5C: _malloc.LIBCMT ref: 02CB3B74
                                                        • Part of subcall function 02CAD2FA: __EH_prolog.LIBCMT ref: 02CAD2FF
                                                      Strings
                                                      • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02CACCFC
                                                      • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02CACCF5
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_mallocstd::exception::exception
                                                      • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                      • API String ID: 1953324306-1943798000
                                                      • Opcode ID: 6e6c8b254e8aaf6b2d09c3b1c0016a1cad44ce5144a066c9138090b4676fcf5e
                                                      • Instruction ID: 074947e8925d5e098e2a11a7eb5261a75120a3b799425fe476e36efde823474d
                                                      • Opcode Fuzzy Hash: 6e6c8b254e8aaf6b2d09c3b1c0016a1cad44ce5144a066c9138090b4676fcf5e
                                                      • Instruction Fuzzy Hash: 12219FB1E01285DADB14EFE8D964BEEBBB5EF54708F10059EE806A7240DB709A04DB51
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CACDB4
                                                        • Part of subcall function 02CAD372: std::exception::exception.LIBCMT ref: 02CAD39F
                                                        • Part of subcall function 02CADB88: __EH_prolog.LIBCMT ref: 02CADB8D
                                                        • Part of subcall function 02CB3B5C: _malloc.LIBCMT ref: 02CB3B74
                                                        • Part of subcall function 02CAD3CF: __EH_prolog.LIBCMT ref: 02CAD3D4
                                                      Strings
                                                      • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02CACDEA
                                                      • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02CACDF1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_mallocstd::exception::exception
                                                      • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                      • API String ID: 1953324306-412195191
                                                      • Opcode ID: 0f7da4823eef5e4fbe47360b214924fa89da1f486331e3ae3bf1237a41038c8f
                                                      • Instruction ID: ef0cf983b57f4128ee59eb433abb584c586d61602a91c42609182d4d0a8a1674
                                                      • Opcode Fuzzy Hash: 0f7da4823eef5e4fbe47360b214924fa89da1f486331e3ae3bf1237a41038c8f
                                                      • Instruction Fuzzy Hash: B8219CB1E01299DADB14EBA4D864BEEFBB5EF44308F10055DE80AA7240DB705A04DB90
                                                      APIs
                                                      • _malloc.LIBCMT ref: 02CA535D
                                                        • Part of subcall function 02CB2FBC: __FF_MSGBANNER.LIBCMT ref: 02CB2FD3
                                                        • Part of subcall function 02CB2FBC: __NMSG_WRITE.LIBCMT ref: 02CB2FDA
                                                        • Part of subcall function 02CB2FBC: RtlAllocateHeap.NTDLL(007F0000,00000000,00000001), ref: 02CB2FFF
                                                      • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02CA536F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateFolderHeapPathSpecial_malloc
                                                      • String ID: \save.dat
                                                      • API String ID: 4128168839-3580179773
                                                      • Opcode ID: 8e8125e0bc9dc614f7736179b8456d6aedcd10935b9e379f80e1d8cef38701a4
                                                      • Instruction ID: da768ddff0ae7696556c4896881f7ea7ea27799c122e4aac264d38865d51ff2e
                                                      • Opcode Fuzzy Hash: 8e8125e0bc9dc614f7736179b8456d6aedcd10935b9e379f80e1d8cef38701a4
                                                      • Instruction Fuzzy Hash: 49117D72D052417BDB228E658C94A9FFF6BDFC2694B2442ACEC4967301D6A30E02C6A0
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA396A
                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 02CA39C1
                                                        • Part of subcall function 02CA1410: std::exception::exception.LIBCMT ref: 02CA1428
                                                        • Part of subcall function 02CAA629: __EH_prolog.LIBCMT ref: 02CAA62E
                                                        • Part of subcall function 02CAA629: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02CAA63D
                                                        • Part of subcall function 02CAA629: __CxxThrowException@8.LIBCMT ref: 02CAA65C
                                                      Strings
                                                      • Day of month is not valid for year, xrefs: 02CA39AC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                      • String ID: Day of month is not valid for year
                                                      • API String ID: 1404951899-1521898139
                                                      • Opcode ID: 5c5bc759ac0903f4ddb8c0a2d84f7a2bcf76a992ae79dc13594fa507e71d9cdc
                                                      • Instruction ID: a847cb6063f17dc544b2c61f4e1338b6fcf463c44c1f6030a93bd86118896f0f
                                                      • Opcode Fuzzy Hash: 5c5bc759ac0903f4ddb8c0a2d84f7a2bcf76a992ae79dc13594fa507e71d9cdc
                                                      • Instruction Fuzzy Hash: 7D01B17A81020AEACB05EFA4D811AEFB779FF18B14F50441AEC04A3310EB704A45DB95
                                                      APIs
                                                      • std::exception::exception.LIBCMT ref: 02CAFB22
                                                      • __CxxThrowException@8.LIBCMT ref: 02CAFB37
                                                        • Part of subcall function 02CB3B5C: _malloc.LIBCMT ref: 02CB3B74
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8Throw_mallocstd::exception::exception
                                                      • String ID: bad allocation
                                                      • API String ID: 4063778783-2104205924
                                                      • Opcode ID: a422c59f336e95ad56dd4121f09ba8c1a40b6b728ff64fdd605b1c2dd855d7b4
                                                      • Instruction ID: b294e96dd6d43f6b279cf6dddd523d4bd9babda4a4ba6a6bf91f98cbe8384901
                                                      • Opcode Fuzzy Hash: a422c59f336e95ad56dd4121f09ba8c1a40b6b728ff64fdd605b1c2dd855d7b4
                                                      • Instruction Fuzzy Hash: 10F082B060430A669F04EAA89C35AEFB3ADAF44218F500569E515D3280EB71EA048599
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA3C1B
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 02CA3C30
                                                        • Part of subcall function 02CB24C7: std::exception::exception.LIBCMT ref: 02CB24D1
                                                        • Part of subcall function 02CAA662: __EH_prolog.LIBCMT ref: 02CAA667
                                                        • Part of subcall function 02CAA662: __CxxThrowException@8.LIBCMT ref: 02CAA690
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                      • String ID: bad cast
                                                      • API String ID: 1300498068-3145022300
                                                      • Opcode ID: 0bf823986a8bd497d8d39ac2530fc5727427382f9c28ef8a06788664a3026b65
                                                      • Instruction ID: f53a59dcb173961f1e66642e1d790d256bf7b2e8999f2d50432ee5ee95d3e35f
                                                      • Opcode Fuzzy Hash: 0bf823986a8bd497d8d39ac2530fc5727427382f9c28ef8a06788664a3026b65
                                                      • Instruction Fuzzy Hash: 66F0A072900508CBC709DF58D850AEAB779FF96315F2041AEED0A6B250CB729A47DE91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA38D2
                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 02CA38F1
                                                        • Part of subcall function 02CA1410: std::exception::exception.LIBCMT ref: 02CA1428
                                                        • Part of subcall function 02CA8997: _memmove.LIBCMT ref: 02CA89B7
                                                      Strings
                                                      • Year is out of valid range: 1400..10000, xrefs: 02CA38E0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                      • String ID: Year is out of valid range: 1400..10000
                                                      • API String ID: 3258419250-2344417016
                                                      • Opcode ID: 023945359ba22ed6e2241051af22f9ec062140241baaea828835f26ddda6238f
                                                      • Instruction ID: b8beca2c58882a8178fd9e16614822601610ba8cf2c83d754968a62201258103
                                                      • Opcode Fuzzy Hash: 023945359ba22ed6e2241051af22f9ec062140241baaea828835f26ddda6238f
                                                      • Instruction Fuzzy Hash: 55E0D872E401145BDB14EBE8CC21BEEBBB9EB08724F10055ED405776C0DEB12945DBD1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA3886
                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 02CA38A5
                                                        • Part of subcall function 02CA1410: std::exception::exception.LIBCMT ref: 02CA1428
                                                        • Part of subcall function 02CA8997: _memmove.LIBCMT ref: 02CA89B7
                                                      Strings
                                                      • Day of month value is out of range 1..31, xrefs: 02CA3894
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                      • String ID: Day of month value is out of range 1..31
                                                      • API String ID: 3258419250-1361117730
                                                      • Opcode ID: c7ed5d75aa8774da0e7ccf8b5a342e931eeb4a5179657d0bb38f9143c5201703
                                                      • Instruction ID: a2ec81cb4e3621c82abea8bbe6146ccd8ff149b28d703e05f001a58f463c6d72
                                                      • Opcode Fuzzy Hash: c7ed5d75aa8774da0e7ccf8b5a342e931eeb4a5179657d0bb38f9143c5201703
                                                      • Instruction Fuzzy Hash: EBE0D872E4011457DB14EBA8CC21BEDBBB9EB48B64F50055ED80577780DAB12905DBD1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA391E
                                                      • std::runtime_error::runtime_error.LIBCPMT ref: 02CA393D
                                                        • Part of subcall function 02CA1410: std::exception::exception.LIBCMT ref: 02CA1428
                                                        • Part of subcall function 02CA8997: _memmove.LIBCMT ref: 02CA89B7
                                                      Strings
                                                      • Month number is out of range 1..12, xrefs: 02CA392C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                      • String ID: Month number is out of range 1..12
                                                      • API String ID: 3258419250-4198407886
                                                      • Opcode ID: f4f5b3a1aea2c098d687273cb7640ba3022c652d5db520c64c6488b5dcd2754c
                                                      • Instruction ID: 54dbbf0dda23d070c62f82a3053328931044e8c78b844bcfb3928a9eb69030a8
                                                      • Opcode Fuzzy Hash: f4f5b3a1aea2c098d687273cb7640ba3022c652d5db520c64c6488b5dcd2754c
                                                      • Instruction Fuzzy Hash: BCE0D872E401189BDB14FBA8CC21BEEBBB9EB08724F20059ED80577680DAB12945DBD1
                                                      APIs
                                                      • TlsAlloc.KERNEL32 ref: 02CA19CC
                                                      • GetLastError.KERNEL32 ref: 02CA19D9
                                                        • Part of subcall function 02CA1712: __EH_prolog.LIBCMT ref: 02CA1717
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocErrorH_prologLast
                                                      • String ID: tss
                                                      • API String ID: 249634027-1638339373
                                                      • Opcode ID: 9dbb9a0881120cf8d8ca7893f5f87312d5dfb3ef7342b021c304144077e4c080
                                                      • Instruction ID: 0703fffc7614de74fde8fe63a45d3aea5d5025115d631b6b948e75a71d7a66b1
                                                      • Opcode Fuzzy Hash: 9dbb9a0881120cf8d8ca7893f5f87312d5dfb3ef7342b021c304144077e4c080
                                                      • Instruction Fuzzy Hash: 12E08631D142155BC3007B78E80818FFBA8DA45234F24876AECBD832D0EB7089549FC2
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02CA3BD8
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 02CA3BED
                                                        • Part of subcall function 02CB24C7: std::exception::exception.LIBCMT ref: 02CB24D1
                                                        • Part of subcall function 02CAA662: __EH_prolog.LIBCMT ref: 02CAA667
                                                        • Part of subcall function 02CAA662: __CxxThrowException@8.LIBCMT ref: 02CAA690
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2630628369.0000000002CA1000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CA1000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2ca1000_avidenta32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                      • String ID: bad cast
                                                      • API String ID: 1300498068-3145022300
                                                      • Opcode ID: 20028b3878c300f3ee270ca3fb5aac9c1e01df2b058b8eaeee32563d33aa3442
                                                      • Instruction ID: 9a644ac4de2b5d797330dba075fee677ea550270df3f53d32ab954beade18372
                                                      • Opcode Fuzzy Hash: 20028b3878c300f3ee270ca3fb5aac9c1e01df2b058b8eaeee32563d33aa3442
                                                      • Instruction Fuzzy Hash: 26E09A71900109DBC708EF58D521BBCB775EF44305F6080ACDC0623290CB305A06CE82
                                                      APIs
                                                      • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404BA8,?,?,?,00000100,?,00000000), ref: 00404E08
                                                      • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404BA8,?,?,?,00000100,?,00000000), ref: 00404E3C
                                                      • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404BA8,?,?,?,00000100,?,00000000), ref: 00404E56
                                                      • HeapFree.KERNEL32(00000000,?,?,00000000,00404BA8,?,?,?,00000100,?,00000000), ref: 00404E6D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2628245711.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000006.00000002.2628245711.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_400000_avidenta32.jbxd
                                                      Similarity
                                                      • API ID: AllocHeap$FreeVirtual
                                                      • String ID:
                                                      • API String ID: 3499195154-0
                                                      • Opcode ID: be4d8ca50aa131807ba676d9363997483af1cc6bc0a4ccddff0ceff735b1d4e8
                                                      • Instruction ID: cf6d2bc5938fe3ffcff82bea2d66dbd09d2dd9e75a0d3cf3d0c4fb3d4d9a8dcb
                                                      • Opcode Fuzzy Hash: be4d8ca50aa131807ba676d9363997483af1cc6bc0a4ccddff0ceff735b1d4e8
                                                      • Instruction Fuzzy Hash: 671146B0201302EFC7209F68EE85D227BB5FB84720710863AE291E25E0C7309845CB9C