Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
740d3a.msi

Overview

General Information

Sample name:740d3a.msi
Analysis ID:1559267
MD5:64a6cf00b80fe77c16f6da137dd7a9d1
SHA1:f9365c7876ac8934a48237499cf8774fe78ea196
SHA256:630acefe136ea2e4bb95211a214e4829d8cb59d4d948b09221e61acd278854bf
Tags:167-114-47-186asyncratewfiles-netmsisigneduser-JAMESWT_MHT
Infos:

Detection

PureCrypter
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Creates autostart registry keys with suspicious names
Detected PureCrypter Trojan
Found many strings related to Crypto-Wallets (likely being stolen)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to harvest and steal Bitcoin Wallet information
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Script Run in AppData
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • msiexec.exe (PID: 1096 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\740d3a.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 6232 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5960 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding BF03D9DA9F637DCB977237F6A9B3752B MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • aipackagechainer.exe (PID: 4052 cmdline: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe" MD5: 2C0130F614EA8C240320EC47D0008EEA)
      • Vista Software.exe (PID: 1056 cmdline: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" MD5: 35135E7F357C522D07DDD87307C0345C)
        • Vista Software.tmp (PID: 2304 cmdline: "C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp" /SL5="$303F2,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" MD5: 584586C0CF548DB94F76F124046D58D9)
          • Vista Software.exe (PID: 4836 cmdline: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT MD5: 35135E7F357C522D07DDD87307C0345C)
            • Vista Software.tmp (PID: 672 cmdline: "C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp" /SL5="$403EC,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT MD5: 584586C0CF548DB94F76F124046D58D9)
              • cmd.exe (PID: 592 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 3856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • tasklist.exe (PID: 2716 cmdline: tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 1524 cmdline: find /I "wrsa.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • cmd.exe (PID: 6708 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 3652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • tasklist.exe (PID: 2800 cmdline: tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 2432 cmdline: find /I "opssvc.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • cmd.exe (PID: 1056 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
              • cmd.exe (PID: 6416 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 2612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • tasklist.exe (PID: 1524 cmdline: tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 5820 cmdline: find /I "avgui.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • cmd.exe (PID: 5760 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 3576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • tasklist.exe (PID: 3648 cmdline: tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 5048 cmdline: find /I "nswscsvc.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • cmd.exe (PID: 4396 cmdline: "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 5088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • tasklist.exe (PID: 4328 cmdline: tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • find.exe (PID: 5716 cmdline: find /I "sophoshealth.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
              • file.exe (PID: 5440 cmdline: "C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x" MD5: 3F58A517F1F4796225137E7659AD2ADB)
                • cmd.exe (PID: 2864 cmdline: "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\doW4t2.a3x && del C:\ProgramData\\doW4t2.a3x MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                  • conhost.exe (PID: 2828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                  • PING.EXE (PID: 6704 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
                  • file.exe (PID: 5988 cmdline: file.exe C:\ProgramData\\doW4t2.a3x MD5: 3F58A517F1F4796225137E7659AD2ADB)
                    • MSBuild.exe (PID: 5896 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
        • conhost.exe (PID: 3784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 5648 cmdline: tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
        • find.exe (PID: 504 cmdline: find /I "avastui.exe" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • powershell.exe (PID: 6040 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 6032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 6640 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 5704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 6440 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
          • conhost.exe (PID: 3212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • AutoIt3.exe (PID: 4872 cmdline: "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x MD5: 3F58A517F1F4796225137E7659AD2ADB)
    • MSBuild.exe (PID: 3756 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • AutoIt3.exe (PID: 1428 cmdline: "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x MD5: 3F58A517F1F4796225137E7659AD2ADB)
    • MSBuild.exe (PID: 5392 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
PureCrypterAccording to zscaler, PureCrypter is a fully-featured loader being sold since at least March 2021The malware has been observed distributing a variety of remote access trojans and information stealersThe loader is a .NET executable obfuscated with SmartAssembly and makes use of compression, encryption and obfuscation to evade antivirus software productsPureCrypter features provide persistence, injection and defense mechanisms that are configurable in Googles Protocol Buffer message format No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.purecrypter
No configs have been found
SourceRuleDescriptionAuthorStrings
00000030.00000002.3268979112.0000000002B71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: file.exe PID: 5988JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        Process Memory Space: MSBuild.exe PID: 5896JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe", ParentImage: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe, ParentProcessId: 4052, ParentProcessName: aipackagechainer.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", ProcessId: 6040, ProcessName: powershell.exe
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\clithe\file.exe, ProcessId: 5988, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eeacadf
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community: Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe", ParentImage: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe, ParentProcessId: 4052, ParentProcessName: aipackagechainer.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", ProcessId: 6040, ProcessName: powershell.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe", ParentImage: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe, ParentProcessId: 4052, ParentProcessName: aipackagechainer.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10", ProcessId: 6040, ProcessName: powershell.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-20T11:17:34.367937+010020355951Domain Observed Used for C2 Detected167.114.47.18656001192.168.2.649984TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeReversingLabs: Detection: 21%
          Source: 740d3a.msiReversingLabs: Detection: 13%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\reclosable_is1Jump to behavior
          Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.6:49713 version: TLS 1.2
          Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\aipackagechainer.pdb source: aipackagechainer.exe, 00000004.00000000.2154424949.0000000000627000.00000002.00000001.01000000.00000003.sdmp, aipackagechainer.exe, 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmp
          Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 0000000B.00000002.2288037024.00000000075EC000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: file.exe, 0000002D.00000003.2963313969.0000000004088000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2963179811.00000000041AB000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2967026741.0000000004224000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: file.exe, 0000002D.00000003.2963313969.0000000004088000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2963179811.00000000041AB000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2967026741.0000000004224000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: <Module>PSEventHandlerRefEmit_InMemoryManifestModulePSGenericEventModulen.pdb\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=571345ComSpec=C:\32K source: powershell.exe, 0000000B.00000002.2288037024.000000000761B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: HPbnXC:\Windows\System.Management.Automation.pdb source: powershell.exe, 0000000F.00000002.2288617216.00000000071A9000.00000004.00000010.00020000.00000000.sdmp
          Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
          Source: C:\Users\user\AppData\Local\clithe\file.exeFile opened: c:
          Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005B4320 FindFirstFileW,FindClose,FindClose,4_2_005B4320
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A6BA0 FindFirstFileW,GetLastError,FindClose,4_2_005A6BA0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0059B5A0 FindFirstFileW,CreateFileW,SetFilePointer,ReadFile,CloseHandle,GetModuleFileNameW,SetCurrentDirectoryW,OpenMutexW,GetLastError,WaitForSingleObject,CloseHandle,CloseHandle,FindClose,4_2_0059B5A0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0059DD10 DeleteFileW,FindFirstFileW,FindNextFileW,FindClose,PathIsDirectoryW,4_2_0059DD10
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005CAC60 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_005CAC60
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0060CCF0 FindFirstFileExW,4_2_0060CCF0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C0E10 FindFirstFileW,FindClose,4_2_005C0E10
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C9440 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_005C9440
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C9880 FindFirstFileW,FindClose,4_2_005C9880
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_00581950 FindFirstFileW,FindNextFileW,FindClose,4_2_00581950
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A3B60 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,4_2_005A3B60
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A7DF0 FindFirstFileW,FindClose,4_2_005A7DF0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0030C0D2 FindFirstFileExW,45_2_0030C0D2
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033E180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,45_2_0033E180
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034A187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,45_2_0034A187
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034A2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,45_2_0034A2E4
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034A66E FindFirstFileW,Sleep,FindNextFileW,FindClose,45_2_0034A66E
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034686D FindFirstFileW,FindNextFileW,FindClose,45_2_0034686D
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033E9BA GetFileAttributesW,FindFirstFileW,FindClose,45_2_0033E9BA
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_003474F0 FindFirstFileW,FindClose,45_2_003474F0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00347591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,45_2_00347591
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033DE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,45_2_0033DE32
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E7E5A5 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,45_2_00E7E5A5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E7E6AD FindFirstFileA,GetLastError,45_2_00E7E6AD
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E7BED5 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,45_2_00E7BED5
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D8C0D2 FindFirstFileExW,47_2_00D8C0D2
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DBE180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,47_2_00DBE180
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DCA187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,47_2_00DCA187
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DCA2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,47_2_00DCA2E4
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DCA66E FindFirstFileW,Sleep,FindNextFileW,FindClose,47_2_00DCA66E
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DC686D FindFirstFileW,FindNextFileW,FindClose,47_2_00DC686D
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DBE9BA GetFileAttributesW,FindFirstFileW,FindClose,47_2_00DBE9BA
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DC74F0 FindFirstFileW,FindClose,47_2_00DC74F0
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DC7591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,47_2_00DC7591
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DBDE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,47_2_00DBDE32
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019BFEFD FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,47_2_019BFEFD
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019C0005 FindFirstFileA,GetLastError,47_2_019C0005
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019BD82D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,47_2_019BD82D
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C80E0 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,4_2_005C80E0

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 167.114.47.186:56001 -> 192.168.2.6:49984
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
          Source: global trafficTCP traffic: 192.168.2.6:49984 -> 167.114.47.186:56001
          Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
          Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
          Source: unknownTCP traffic detected without corresponding DNS query: 104.18.20.226
          Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
          Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
          Source: unknownTCP traffic detected without corresponding DNS query: 104.18.20.226
          Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
          Source: unknownTCP traffic detected without corresponding DNS query: 104.18.21.226
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.17
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.17
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.17
          Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.17
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: unknownTCP traffic detected without corresponding DNS query: 167.114.47.186
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034D935 InternetReadFile,SetEvent,GetLastError,SetEvent,45_2_0034D935
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
          Source: MSBuild.exe, 0000002E.00000002.3381212760.0000000000DE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
          Source: MSBuild.exe, 0000002E.00000002.3381212760.0000000000DE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
          Source: powershell.exe, 00000008.00000002.2247946185.00000000030E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabM
          Source: powershell.exe, 00000008.00000002.2247946185.0000000003124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enq
          Source: powershell.exe, 00000008.00000002.2297404851.0000000005F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2277059050.0000000005ED7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
          Source: powershell.exe, 0000000F.00000002.2250253596.00000000050E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2294302835.00000000075AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000008.00000002.2255750077.0000000004EF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2247764460.0000000004E71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2250253596.0000000004F61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000002E.00000002.3385347681.0000000003070000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
          Source: powershell.exe, 0000000F.00000002.2250253596.00000000050E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2294302835.00000000075AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000027.00000000.2268475312.00000000003A5000.00000002.00000001.01000000.0000000B.sdmp, file.exe, 0000002D.00000000.2921494238.00000000003A5000.00000002.00000001.01000000.0000000B.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000000.3052534350.0000000000E25000.00000002.00000001.01000000.0000000D.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/X
          Source: powershell.exe, 00000008.00000002.2255750077.0000000004EF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2247764460.0000000004E71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2250253596.0000000004F61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 0000000F.00000002.2250253596.00000000050E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2294302835.00000000075AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe
          Source: Vista Software.exe, 00000005.00000000.2160371198.0000000000A21000.00000020.00000001.01000000.00000006.sdmpString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
          Source: powershell.exe, 00000008.00000002.2297404851.0000000005F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2277059050.0000000005ED7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/autoit3/
          Source: AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/06
          Source: Vista Software.exe, 00000005.00000003.2167669347.000000007F84B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000005.00000003.2164502504.000000000315F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 00000006.00000000.2170071258.0000000000041000.00000020.00000001.01000000.00000007.sdmp, Vista Software.tmp, 0000000A.00000000.2193818046.000000000097D000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: https://www.innosetup.com/
          Source: Vista Software.exe, 00000005.00000003.2167669347.000000007F84B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000005.00000003.2164502504.000000000315F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 00000006.00000000.2170071258.0000000000041000.00000020.00000001.01000000.00000007.sdmp, Vista Software.tmp, 0000000A.00000000.2193818046.000000000097D000.00000020.00000001.01000000.00000009.sdmpString found in binary or memory: https://www.remobjects.com/ps
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
          Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
          Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49898 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49976
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49975
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49970
          Source: unknownNetwork traffic detected: HTTP traffic on port 49967 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
          Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
          Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49969
          Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
          Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49968
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49967
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49964
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49963
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49962
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49961
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49960
          Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
          Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49957
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49955
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
          Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49951
          Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49950
          Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49955 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49947
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
          Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
          Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
          Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
          Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49898
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49897
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49896
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
          Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49897 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49911 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
          Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
          Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
          Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
          Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
          Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
          Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
          Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49963 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
          Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
          Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
          Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49953 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49972 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49938 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49951 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49962 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49970 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49946 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49969 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
          Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49939
          Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49938
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
          Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
          Source: unknownNetwork traffic detected: HTTP traffic on port 49925 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49960 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49929
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49927
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49925
          Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
          Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.6:49713 version: TLS 1.2
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034F664 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,45_2_0034F664
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034F8D3 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,45_2_0034F8D3
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DCF8D3 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,47_2_00DCF8D3
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034F664 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,45_2_0034F664
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033AA95 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,45_2_0033AA95
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00369FB4 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,45_2_00369FB4
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DE9FB4 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,47_2_00DE9FB4
          Source: Yara matchFile source: Process Memory Space: file.exe PID: 5988, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E902A1 CreateDesktopA,CreateProcessA,CreateProcessA,CreateProcessA,CreateProcessA,WaitForSingleObject,45_2_00E902A1
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E93729 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,45_2_00E93729
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E92905 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,45_2_00E92905
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019D5081 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,47_2_019D5081
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033E3CB: CreateFileW,DeviceIoControl,CloseHandle,45_2_0033E3CB
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033230F LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,45_2_0033230F
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0058C3A0 GetForegroundWindow,MessageBoxW,GetCurrentProcess,OpenProcessToken,CloseHandle,GetLastError,ExitWindowsEx,CloseHandle,4_2_0058C3A0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033F76E ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,45_2_0033F76E
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DBF76E ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,47_2_00DBF76E
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3fe04b.msiJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE24F.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE4A1.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE696.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE6E6.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE735.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE774.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}Jump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE802.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3fe04e.msiJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3fe04e.msiJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE90C.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE9D9.tmpJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIE24F.tmpJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0058AB004_2_0058AB00
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005BFF104_2_005BFF10
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005FA0D04_2_005FA0D0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EE0904_2_005EE090
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005E81004_2_005E8100
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005815F04_2_005815F0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EA4104_2_005EA410
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EE4904_2_005EE490
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EA4B04_2_005EA4B0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0058E5404_2_0058E540
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005B25404_2_005B2540
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EC5C04_2_005EC5C0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EE6404_2_005EE640
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EC6E04_2_005EC6E0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0058E8704_2_0058E870
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005929404_2_00592940
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005E4A504_2_005E4A50
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0058EAA04_2_0058EAA0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_00610D6D4_2_00610D6D
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_00608E604_2_00608E60
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F4E004_2_005F4E00
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005D90504_2_005D9050
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_006091C04_2_006091C0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005E31904_2_005E3190
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005AF2704_2_005AF270
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EF4004_2_005EF400
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005DD6F04_2_005DD6F0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005859304_2_00585930
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005EDA304_2_005EDA30
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005FDACC4_2_005FDACC
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005D7CA04_2_005D7CA0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005DFD204_2_005DFD20
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005ADDB04_2_005ADDB0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005ADEC04_2_005ADEC0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005FDF0B4_2_005FDF0B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_030A126511_2_030A1265
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002D707045_2_002D7070
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002E3AD945_2_002E3AD9
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0030E32F45_2_0030E32F
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F24CA45_2_002F24CA
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0030659945_2_00306599
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0035C84445_2_0035C844
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F29E345_2_002F29E3
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002FC9C045_2_002FC9C0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002ECBF045_2_002ECBF0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00306C0945_2_00306C09
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00342D8145_2_00342D81
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002DCE2045_2_002DCE20
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002DEE0045_2_002DEE00
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F2F2345_2_002F2F23
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002EF0DA45_2_002EF0DA
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033916845_2_00339168
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0036525A45_2_0036525A
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002ED37F45_2_002ED37F
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F774645_2_002F7746
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002E58B845_2_002E58B8
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F196445_2_002F1964
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F797545_2_002F7975
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F7BD245_2_002F7BD2
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002DDC7045_2_002DDC70
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00309D1E45_2_00309D1E
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002D5D7145_2_002D5D71
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F1FC145_2_002F1FC1
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E9308145_2_00E93081
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_0125204046_2_01252040
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_012523EC46_2_012523EC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_0125242546_2_01252425
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_0125240846_2_01252408
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_0125247846_2_01252478
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_0125244046_2_01252440
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_0125245F46_2_0125245F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_0125249146_2_01252491
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_01254AE846_2_01254AE8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_01254AF846_2_01254AF8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_01251DA846_2_01251DA8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_01251DB846_2_01251DB8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F8573046_2_05F85730
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F82D4546_2_05F82D45
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F8573946_2_05F85739
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F851E746_2_05F851E7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F851DE46_2_05F851DE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F8580546_2_05F85805
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F852DD46_2_05F852DD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F8342046_2_05F83420
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 46_2_05F8341046_2_05F83410
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D5707047_2_00D57070
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D63AD947_2_00D63AD9
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D8E32F47_2_00D8E32F
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D724CA47_2_00D724CA
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D8659947_2_00D86599
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DDC84447_2_00DDC844
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D7C9C047_2_00D7C9C0
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D729E347_2_00D729E3
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D6CBF047_2_00D6CBF0
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D86C0947_2_00D86C09
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DC2D8147_2_00DC2D81
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D5EE0047_2_00D5EE00
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D5CE2047_2_00D5CE20
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D72F2347_2_00D72F23
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D6F0DA47_2_00D6F0DA
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DB916847_2_00DB9168
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DE525A47_2_00DE525A
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D6D37F47_2_00D6D37F
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D7774647_2_00D77746
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D7797547_2_00D77975
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D7196447_2_00D71964
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D77BD247_2_00D77BD2
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D5DC7047_2_00D5DC70
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D89D1E47_2_00D89D1E
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D71FC147_2_00D71FC1
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019D49D947_2_019D49D9
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019D49D247_2_019D49D2
          Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 00D5FA3B appears 33 times
          Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 00D7488E appears 33 times
          Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 00D7014F appears 40 times
          Source: C:\dbgbkfc\AutoIt3.exeCode function: String function: 00D71000 appears 41 times
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 005839B0 appears 49 times
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 00585680 appears 66 times
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 005F5540 appears 55 times
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: String function: 00585350 appears 67 times
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 002F014F appears 40 times
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 002F1000 appears 41 times
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 002F488E appears 33 times
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: String function: 002DFA3B appears 33 times
          Source: Vista Software.tmp.5.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
          Source: Vista Software.tmp.7.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
          Source: is-3O9ML.tmp.10.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
          Source: Vista Software.tmp.5.drStatic PE information: Number of sections : 11 > 10
          Source: Vista Software.tmp.7.drStatic PE information: Number of sections : 11 > 10
          Source: Vista Software.exe.3.drStatic PE information: Number of sections : 11 > 10
          Source: is-3O9ML.tmp.10.drStatic PE information: Number of sections : 11 > 10
          Source: 45.2.file.exe.3ad2f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
          Source: 45.2.file.exe.3ad2f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
          Source: 45.2.file.exe.3ad2f24.1.raw.unpack, IdentifierAuthenticationMapper.csCryptographic APIs: 'CreateDecryptor'
          Source: 47.2.AutoIt3.exe.4182f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
          Source: 47.2.AutoIt3.exe.4182f24.1.raw.unpack, TokenValListener.csCryptographic APIs: 'CreateDecryptor'
          Source: 47.2.AutoIt3.exe.4182f24.1.raw.unpack, IdentifierAuthenticationMapper.csCryptographic APIs: 'CreateDecryptor'
          Source: classification engineClassification label: mal100.troj.spyw.evad.winMSI@82/60@0/2
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A9710 FormatMessageW,GetLastError,4_2_005A9710
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_003321C9 AdjustTokenPrivileges,CloseHandle,45_2_003321C9
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_003327D9 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,45_2_003327D9
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DB21C9 AdjustTokenPrivileges,CloseHandle,47_2_00DB21C9
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DB27D9 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,47_2_00DB27D9
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005CA8A0 GetDiskFreeSpaceExW,4_2_005CA8A0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033E2AB CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CompareStringW,CloseHandle,45_2_0033E2AB
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005D4B00 CoCreateInstance,4_2_005D4B00
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A2720 LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,4_2_005A2720
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CMLE83A.tmpJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6032:120:WilError_03
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2828:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5704:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3784:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3212:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5088:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3856:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2612:120:WilError_03
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\8f1bd2930e
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3576:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3652:120:WilError_03
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF3E2DFAA254D6C083.TMPJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\clithe\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
          Source: C:\dbgbkfc\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
          Source: C:\dbgbkfc\AutoIt3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
          Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;WRSA.EXE&apos;
          Source: C:\Windows\System32\find.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;AVGUI.EXE&apos;
          Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;OPSSVC.EXE&apos;
          Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;AVASTUI.EXE&apos;
          Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;AVGUI.EXE&apos;
          Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;NSWSCSVC.EXE&apos;
          Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = &apos;SOPHOSHEALTH.EXE&apos;
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeFile read: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.iniJump to behavior
          Source: C:\Windows\System32\msiexec.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
          Source: 740d3a.msiReversingLabs: Detection: 13%
          Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\740d3a.msi"
          Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
          Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BF03D9DA9F637DCB977237F6A9B3752B
          Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp" /SL5="$303F2,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp" /SL5="$403EC,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "wrsa.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "opssvc.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Windows\System32\find.exe find /I "avastui.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avgui.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "nswscsvc.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "sophoshealth.exe"
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Local\clithe\file.exe "C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x"
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\doW4t2.a3x && del C:\ProgramData\\doW4t2.a3x
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\clithe\file.exe file.exe C:\ProgramData\\doW4t2.a3x
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: unknownProcess created: C:\dbgbkfc\AutoIt3.exe "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
          Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: unknownProcess created: C:\dbgbkfc\AutoIt3.exe "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
          Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BF03D9DA9F637DCB977237F6A9B3752BJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp" /SL5="$303F2,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENTJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess created: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp "C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp" /SL5="$403EC,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENTJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Local\clithe\file.exe "C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x"Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "wrsa.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "opssvc.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avastui.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avgui.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "nswscsvc.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "sophoshealth.exe"
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\doW4t2.a3x && del C:\ProgramData\\doW4t2.a3x
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\clithe\file.exe file.exe C:\ProgramData\\doW4t2.a3x
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: atlthunk.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: explorerframe.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: rstrtmgr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: rstrtmgr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: explorerframe.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: sfc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: sfc_os.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
          Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
          Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
          Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wsock32.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: version.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: winmm.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: mpr.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wininet.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: iphlpapi.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: userenv.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: kernel.appcore.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: cryptsp.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: rsaenh.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: cryptbase.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: profapi.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: propsys.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: edputil.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: urlmon.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: iertutil.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: srvcli.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: netutils.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: windows.staterepositoryps.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: sspicli.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wintypes.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: appresolver.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: bcp47langs.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: slc.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: sppc.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: onecorecommonproxystub.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: onecoreuapcommonproxystub.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: pcacli.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: sfc_os.dll
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dll
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dll
          Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wsock32.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: version.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: winmm.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: mpr.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: wininet.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: iphlpapi.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: userenv.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Local\clithe\file.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: wsock32.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: version.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: winmm.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: mpr.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: wininet.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: iphlpapi.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: userenv.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: uxtheme.dll
          Source: C:\dbgbkfc\AutoIt3.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
          Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.iniJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpWindow found: window name: TMainFormJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\reclosable_is1Jump to behavior
          Source: 740d3a.msiStatic file information: File size 6722560 > 1048576
          Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\aipackagechainer.pdb source: aipackagechainer.exe, 00000004.00000000.2154424949.0000000000627000.00000002.00000001.01000000.00000003.sdmp, aipackagechainer.exe, 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmp
          Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 0000000B.00000002.2288037024.00000000075EC000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: file.exe, 0000002D.00000003.2963313969.0000000004088000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2963179811.00000000041AB000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2967026741.0000000004224000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: file.exe, 0000002D.00000003.2963313969.0000000004088000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2963179811.00000000041AB000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2967026741.0000000004224000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: <Module>PSEventHandlerRefEmit_InMemoryManifestModulePSGenericEventModulen.pdb\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files (x86)\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=571345ComSpec=C:\32K source: powershell.exe, 0000000B.00000002.2288037024.000000000761B000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: HPbnXC:\Windows\System.Management.Automation.pdb source: powershell.exe, 0000000F.00000002.2288617216.00000000071A9000.00000004.00000010.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: 45.2.file.exe.3ad2f24.1.raw.unpack, TokenValListener.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 47.2.AutoIt3.exe.4182f24.1.raw.unpack, TokenValListener.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A98C0 LoadLibraryW,GetProcAddress,GetSystemMetrics,GetSystemMetrics,LoadImageW,FreeLibrary,4_2_005A98C0
          Source: Vista Software.tmp.5.drStatic PE information: real checksum: 0x0 should be: 0x37b358
          Source: Vista Software.tmp.7.drStatic PE information: real checksum: 0x0 should be: 0x37b358
          Source: Vista Software.exe.3.drStatic PE information: real checksum: 0x85f640a should be: 0x33372a
          Source: is-3O9ML.tmp.10.drStatic PE information: real checksum: 0x0 should be: 0x3817ca
          Source: aipackagechainer.exe.3.drStatic PE information: real checksum: 0xe3b49 should be: 0xe4c7b
          Source: MSIE90C.tmp.2.drStatic PE information: section name: .didat
          Source: MSIE90C.tmp.2.drStatic PE information: section name: .fptable
          Source: MSIE24F.tmp.2.drStatic PE information: section name: .fptable
          Source: MSIE4A1.tmp.2.drStatic PE information: section name: .fptable
          Source: MSIE696.tmp.2.drStatic PE information: section name: .fptable
          Source: MSIE6E6.tmp.2.drStatic PE information: section name: .fptable
          Source: MSIE735.tmp.2.drStatic PE information: section name: .fptable
          Source: MSIE774.tmp.2.drStatic PE information: section name: .didat
          Source: MSIE774.tmp.2.drStatic PE information: section name: .fptable
          Source: Vista Software.exe.3.drStatic PE information: section name: .didata
          Source: aipackagechainer.exe.3.drStatic PE information: section name: .didat
          Source: aipackagechainer.exe.3.drStatic PE information: section name: .fptable
          Source: Vista Software.tmp.5.drStatic PE information: section name: .didata
          Source: Vista Software.tmp.7.drStatic PE information: section name: .didata
          Source: is-3O9ML.tmp.10.drStatic PE information: section name: .didata
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F1054 push edi; ret 4_2_005F105F
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F512D push ecx; ret 4_2_005F5140
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04A637F5 pushad ; ret 8_2_04A637F9
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04A637FA pushfd ; ret 8_2_04A63809
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F1046 push ecx; ret 45_2_002F1059
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E940C9 push 00E940FDh; ret 45_2_00E940F5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E940D1 push 00E940FDh; ret 45_2_00E940F5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E900B9 push 00E90136h; ret 45_2_00E9012E
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E900B7 push 00E90136h; ret 45_2_00E9012E
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E94076 push 00E940FDh; ret 45_2_00E940F5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E93049 push 00E93075h; ret 45_2_00E9306D
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F045 push 00E8F071h; ret 45_2_00E8F069
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E9105D push 00E91089h; ret 45_2_00E91081
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E91023 push 00E91051h; ret 45_2_00E91049
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E91025 push 00E91051h; ret 45_2_00E91049
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F1D1 push 00E8F1FDh; ret 45_2_00E8F1F5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F199 push 00E8F1C5h; ret 45_2_00E8F1BD
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F161 push 00E8F18Dh; ret 45_2_00E8F185
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E94144 push ebp; iretd 45_2_00E9415E
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E94109 push 00E9412Fh; ret 45_2_00E94127
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F2D1 push 00E8F2FDh; ret 45_2_00E8F2F5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F2B1 push 00E8F2FDh; ret 45_2_00E8F2F5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E7D265 push 00E7D291h; ret 45_2_00E7D289
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F279 push 00E8F2A5h; ret 45_2_00E8F29D
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E92241 push 00E9226Dh; ret 45_2_00E92265
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F241 push 00E8F26Dh; ret 45_2_00E8F265
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8F209 push 00E8F235h; ret 45_2_00E8F22D
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E913C9 push 00E913F5h; ret 45_2_00E913ED
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E92489 push 00E924D5h; ret 45_2_00E924CD
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8E495 push 00E8E4C1h; ret 45_2_00E8E4B9
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E83439 push 00E835B5h; ret 45_2_00E835AD
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE735.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\is-AA44E.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE24F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\clithe\file.exeFile created: C:\dbgbkfc\AutoIt3.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\unins000.exe (copy)Jump to dropped file
          Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\file.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\Temp\is-B174P.tmp\_isetup\_setup64.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\clithe\is-3O9ML.tmpJump to dropped file
          Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeJump to dropped file
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeFile created: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE6E6.tmpJump to dropped file
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeFile created: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE774.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE696.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE4A1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpFile created: C:\Users\user\AppData\Local\Temp\is-SB6EB.tmp\_isetup\_setup64.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE90C.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE735.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE24F.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE6E6.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE774.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE696.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE4A1.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE90C.tmpJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
          Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
          Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
          Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
          Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce eeacadf
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00362558 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,45_2_00362558
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002E5D03 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,45_2_002E5D03
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DE2558 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,47_2_00DE2558
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D65D03 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,47_2_00D65D03
          Source: C:\Windows\System32\msiexec.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 BlobJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\dbgbkfc\AutoIt3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\dbgbkfc\AutoIt3.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1210000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2B90000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4B90000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 10D0000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2B30000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 28E0000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1590000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 32B0000 memory reserve | memory write watch
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 52B0000 memory reserve | memory write watch
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899872Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899722Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899593Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899480Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899372Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899125Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898640Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899888
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899751
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899205
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898988
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898873
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6333Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1687Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2431Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 514Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2074
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 3156
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 6630
          Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE735.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE24F.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\clithe\unins000.exe (copy)Jump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-B174P.tmp\_isetup\_setup64.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\clithe\is-3O9ML.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE6E6.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE774.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE696.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE4A1.tmpJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-SB6EB.tmp\_isetup\_setup64.tmpJump to dropped file
          Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE90C.tmpJump to dropped file
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_4-56993
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_4-56919
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeAPI coverage: 9.9 %
          Source: C:\Users\user\AppData\Local\clithe\file.exeAPI coverage: 5.5 %
          Source: C:\dbgbkfc\AutoIt3.exeAPI coverage: 5.5 %
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5712Thread sleep time: -6456360425798339s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6804Thread sleep time: -1844674407370954s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5256Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4024Thread sleep count: 2431 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1616Thread sleep count: 514 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -5534023222112862s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -900000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -899872s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -899722s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -899593s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -899480s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -899372s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -899125s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6992Thread sleep time: -898640s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6228Thread sleep count: 2074 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6304Thread sleep count: 109 > 30
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -900000s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -899888s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -899751s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -899205s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -898988s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep time: -898873s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7020Thread sleep count: 35 > 30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7020Thread sleep time: -32281802128991695s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3924Thread sleep count: 3156 > 30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3924Thread sleep count: 6630 > 30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1212Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2056Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
          Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005B4320 FindFirstFileW,FindClose,FindClose,4_2_005B4320
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A6BA0 FindFirstFileW,GetLastError,FindClose,4_2_005A6BA0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0059B5A0 FindFirstFileW,CreateFileW,SetFilePointer,ReadFile,CloseHandle,GetModuleFileNameW,SetCurrentDirectoryW,OpenMutexW,GetLastError,WaitForSingleObject,CloseHandle,CloseHandle,FindClose,4_2_0059B5A0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0059DD10 DeleteFileW,FindFirstFileW,FindNextFileW,FindClose,PathIsDirectoryW,4_2_0059DD10
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005CAC60 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_005CAC60
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0060CCF0 FindFirstFileExW,4_2_0060CCF0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C0E10 FindFirstFileW,FindClose,4_2_005C0E10
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C9440 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,4_2_005C9440
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C9880 FindFirstFileW,FindClose,4_2_005C9880
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_00581950 FindFirstFileW,FindNextFileW,FindClose,4_2_00581950
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A3B60 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,4_2_005A3B60
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A7DF0 FindFirstFileW,FindClose,4_2_005A7DF0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0030C0D2 FindFirstFileExW,45_2_0030C0D2
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033E180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,45_2_0033E180
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034A187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,45_2_0034A187
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034A2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,45_2_0034A2E4
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034A66E FindFirstFileW,Sleep,FindNextFileW,FindClose,45_2_0034A66E
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034686D FindFirstFileW,FindNextFileW,FindClose,45_2_0034686D
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033E9BA GetFileAttributesW,FindFirstFileW,FindClose,45_2_0033E9BA
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_003474F0 FindFirstFileW,FindClose,45_2_003474F0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00347591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,45_2_00347591
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033DE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,45_2_0033DE32
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E7E5A5 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,45_2_00E7E5A5
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E7E6AD FindFirstFileA,GetLastError,45_2_00E7E6AD
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E7BED5 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,45_2_00E7BED5
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D8C0D2 FindFirstFileExW,47_2_00D8C0D2
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DBE180 GetFileAttributesW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,47_2_00DBE180
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DCA187 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,47_2_00DCA187
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DCA2E4 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,47_2_00DCA2E4
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DCA66E FindFirstFileW,Sleep,FindNextFileW,FindClose,47_2_00DCA66E
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DC686D FindFirstFileW,FindNextFileW,FindClose,47_2_00DC686D
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DBE9BA GetFileAttributesW,FindFirstFileW,FindClose,47_2_00DBE9BA
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DC74F0 FindFirstFileW,FindClose,47_2_00DC74F0
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DC7591 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,47_2_00DC7591
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DBDE32 GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,47_2_00DBDE32
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019BFEFD FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,47_2_019BFEFD
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019C0005 FindFirstFileA,GetLastError,47_2_019C0005
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019BD82D GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,47_2_019BD82D
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005C80E0 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,4_2_005C80E0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F16FD VirtualQuery,GetSystemInfo,4_2_005F16FD
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899872Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899722Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899593Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899480Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899372Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899125Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898640Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 900000
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899888
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899751
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 899205
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898988
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 898873
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
          Source: AutoIt3.exe, 0000002F.00000002.3106151055.0000000001858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware
          Source: file.exe, file.exe, 0000002D.00000002.2964646005.0000000000D17000.00000004.00000020.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2960071049.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2964996138.0000000000DFB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2964646005.0000000000D73000.00000004.00000020.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2960071049.0000000000DF9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2964646005.0000000000CE7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, AutoIt3.exe, AutoIt3.exe, 0000002F.00000002.3107008696.00000000019B6000.00000040.00000020.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3106151055.00000000018B5000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3106151055.0000000001828000.00000004.00000020.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3106151055.0000000001858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft hyper-v video
          Source: MSBuild.exe, 0000002E.00000002.3400764560.00000000057E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
          Source: MSBuild.exe, 0000002E.00000002.3400764560.00000000057E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MBp
          Source: MSBuild.exe, 0000002E.00000002.3400764560.00000000057E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8D397 LdrInitializeThunk,45_2_00E8D397
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0034F607 BlockInput,45_2_0034F607
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F5342 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_005F5342
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005AAAA0 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,OutputDebugStringW,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,4_2_005AAAA0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A98C0 LoadLibraryW,GetProcAddress,GetSystemMetrics,GetSystemMetrics,LoadImageW,FreeLibrary,4_2_005A98C0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F1EBE mov esi, dword ptr fs:[00000030h]4_2_005F1EBE
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F4BF4 mov eax, dword ptr fs:[00000030h]45_2_002F4BF4
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E9EFEE mov eax, dword ptr fs:[00000030h]45_2_00E9EFEE
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E93081 mov eax, dword ptr fs:[00000030h]45_2_00E93081
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E93081 mov eax, dword ptr fs:[00000030h]45_2_00E93081
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00E8D195 mov eax, dword ptr fs:[00000030h]45_2_00E8D195
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D74BF4 mov eax, dword ptr fs:[00000030h]47_2_00D74BF4
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019D49D9 mov eax, dword ptr fs:[00000030h]47_2_019D49D9
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019D49D9 mov eax, dword ptr fs:[00000030h]47_2_019D49D9
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019D49D2 mov eax, dword ptr fs:[00000030h]47_2_019D49D2
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019D49D2 mov eax, dword ptr fs:[00000030h]47_2_019D49D2
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019CEAED mov eax, dword ptr fs:[00000030h]47_2_019CEAED
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_019E0946 mov eax, dword ptr fs:[00000030h]47_2_019E0946
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F1F2A GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,4_2_005F1F2A
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
          Source: C:\Windows\System32\msiexec.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F4433 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_005F4433
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_0058CEA0 __set_se_translator,SetUnhandledExceptionFilter,4_2_0058CEA0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F5342 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_005F5342
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F54CF SetUnhandledExceptionFilter,4_2_005F54CF
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F96A3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_005F96A3
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00302446 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_00302446
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F0E4D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,45_2_002F0E4D
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F0F9F SetUnhandledExceptionFilter,45_2_002F0F9F
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F11EE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,45_2_002F11EE
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D82446 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_00D82446
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D70E4D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,47_2_00D70E4D
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D70F9F SetUnhandledExceptionFilter,47_2_00D70F9F
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00D711EE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,47_2_00D711EE
          Source: C:\Users\user\AppData\Local\clithe\file.exeMemory protected: page readonly | page read and write | page execute | page execute read | page execute and read and write | page execute and write copy | page guard | page no cache | page write combine

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 167.114.47.186lendfii.linkminervini.reminervini.dayostium.cxostium.gscapslue12.compixerealms.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"Default
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033230F LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,45_2_0033230F
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005CE3A0 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetProcessId,AllowSetForegroundWindow,4_2_005CE3A0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0033C078 SendInput,keybd_event,45_2_0033C078
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00352E89 GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,45_2_00352E89
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmpProcess created: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe "C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENTJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "wrsa.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "opssvc.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avastui.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "avgui.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "nswscsvc.exe"
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /I "sophoshealth.exe"
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\doW4t2.a3x && del C:\ProgramData\\doW4t2.a3x
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\clithe\file.exe file.exe C:\ProgramData\\doW4t2.a3x
          Source: C:\Users\user\AppData\Local\clithe\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: C:\dbgbkfc\AutoIt3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -noninteractive -nologo -executionpolicy remotesigned -command "c:\users\user\appdata\local\temp\ai_f78c.ps1 -paths 'c:\users\user\appdata\roaming\your company\your application\prerequisites\file_deleter.ps1','c:\users\user\appdata\roaming\your company\your application\prerequisites\aipackagechainer.exe' -retry_count 10"
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -noprofile -noninteractive -nologo -executionpolicy remotesigned -command "c:\users\user\appdata\local\temp\ai_f78c.ps1 -paths 'c:\users\user\appdata\roaming\your company\your application\prerequisites\file_deleter.ps1','c:\users\user\appdata\roaming\your company\your application\prerequisites\aipackagechainer.exe' -retry_count 10"Jump to behavior
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00331C68 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,45_2_00331C68
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005A4710 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,CloseHandle,4_2_005A4710
          Source: Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DA0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000027.00000000.2268180930.0000000000391000.00000002.00000001.01000000.0000000B.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041D8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: file.exe, AutoIt3.exeBinary or memory string: Shell_TrayWnd
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002D9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerDA2A9C98D0BE5F"
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerh{
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_002F0CA4 cpuid 45_2_002F0CA4
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,4_2_005D4DC0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_00606EC2
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,4_2_0060F284
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_006073C9
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_0060F4A0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_0060F543
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_0060F58E
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: EnumSystemLocalesW,4_2_0060F629
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_0060F6C0
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_0060F920
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_0060FA45
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetLocaleInfoW,4_2_0060FB4B
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_0060FC27
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,45_2_00E7C0AD
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,45_2_00E8107D
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,45_2_00E81031
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,45_2_00E7C1B7
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,GetACP,45_2_00E825C9
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: GetLocaleInfoA,45_2_00E7C9D1
          Source: C:\dbgbkfc\AutoIt3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,47_2_019BDA05
          Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,47_2_019BE329
          Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,47_2_019C2989
          Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,47_2_019C29D5
          Source: C:\dbgbkfc\AutoIt3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,47_2_019BDB0F
          Source: C:\dbgbkfc\AutoIt3.exeCode function: GetLocaleInfoA,GetACP,47_2_019C3F21
          Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Users\user\AppData\Local\clithe\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\dbgbkfc\AutoIt3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
          Source: C:\Users\user\AppData\Local\clithe\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
          Source: C:\Users\user\AppData\Local\clithe\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
          Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
          Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
          Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
          Source: C:\dbgbkfc\AutoIt3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductID
          Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ScheduledJob\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ScheduledJob.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005F4355 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,4_2_005F4355
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_003159C7 GetUserNameW,45_2_003159C7
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_0030B782 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,45_2_0030B782
          Source: C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exeCode function: 4_2_005815F0 GetVersionExW,GetVersionExW,IsProcessorFeaturePresent,4_2_005815F0
          Source: C:\Users\user\AppData\Local\clithe\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: find.exe, 0000001E.00000002.2257637328.000002498339B000.00000004.00000020.00020000.00000000.sdmp, find.exe, 0000001E.00000002.2257730128.0000024983745000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgui.exe
          Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EFC31460C619ECAE59C1BCE2C008036D94C84B8 BlobJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002D9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumP
          Source: file.exe, 00000027.00000003.2269497605.000000000135C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: YLJAXXBYLW]XB@3
          Source: MSBuild.exe, 0000002E.00000002.3400764560.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002D9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3C:\Users\user\AppData\Roaming\Ethereum\keystore
          Source: MSBuild.exe, 0000002E.00000002.3400764560.00000000057E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
          Source: MSBuild.exe, 0000002E.00000002.3385347681.0000000002D9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
          Source: powershell.exe, 00000008.00000002.2313060224.0000000007AD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sqlcolumnencryptionkeystoreprovider
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt
          Source: AutoIt3.exeBinary or memory string: WIN_81
          Source: AutoIt3.exeBinary or memory string: WIN_XP
          Source: AutoIt3.exeBinary or memory string: WIN_XPe
          Source: AutoIt3.exeBinary or memory string: WIN_VISTA
          Source: AutoIt3.exe, 0000002F.00000003.3104399885.0000000004888000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 15, 1USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
          Source: AutoIt3.exeBinary or memory string: WIN_7
          Source: AutoIt3.exeBinary or memory string: WIN_8
          Source: Yara matchFile source: 00000030.00000002.3268979112.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5896, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_003523E0 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,45_2_003523E0
          Source: C:\Users\user\AppData\Local\clithe\file.exeCode function: 45_2_00351DD8 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,45_2_00351DD8
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DD23E0 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,47_2_00DD23E0
          Source: C:\dbgbkfc\AutoIt3.exeCode function: 47_2_00DD1DD8 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,47_2_00DD1DD8
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          341
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          31
          Disable or Modify Tools
          21
          Input Capture
          2
          System Time Discovery
          Remote Services11
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomains1
          Replication Through Removable Media
          2
          Native API
          1
          Create Account
          1
          DLL Side-Loading
          111
          Deobfuscate/Decode Files or Information
          LSASS Memory11
          Peripheral Device Discovery
          Remote Desktop Protocol1
          Data from Local System
          12
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Command and Scripting Interpreter
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Obfuscated Files or Information
          Security Account Manager1
          Account Discovery
          SMB/Windows Admin Shares21
          Input Capture
          1
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal Accounts1
          PowerShell
          1
          Windows Service
          21
          Access Token Manipulation
          1
          Software Packing
          NTDS4
          File and Directory Discovery
          Distributed Component Object Model3
          Clipboard Data
          1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchd11
          Registry Run Keys / Startup Folder
          1
          Windows Service
          1
          DLL Side-Loading
          LSA Secrets278
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
          Process Injection
          1
          File Deletion
          Cached Domain Credentials571
          Security Software Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items11
          Registry Run Keys / Startup Folder
          21
          Masquerading
          DCSync351
          Virtualization/Sandbox Evasion
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
          Valid Accounts
          Proc Filesystem4
          Process Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Modify Registry
          /etc/passwd and /etc/shadow11
          Application Window Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron351
          Virtualization/Sandbox Evasion
          Network Sniffing3
          System Owner/User Discovery
          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
          Access Token Manipulation
          Input Capture1
          Remote System Discovery
          Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task12
          Process Injection
          Keylogging1
          System Network Configuration Discovery
          Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1559267 Sample: 740d3a.msi Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 140 Suricata IDS alerts for network traffic 2->140 142 Multi AV Scanner detection for dropped file 2->142 144 Multi AV Scanner detection for submitted file 2->144 146 3 other signatures 2->146 14 msiexec.exe 86 55 2->14         started        17 AutoIt3.exe 2->17         started        19 AutoIt3.exe 2->19         started        21 msiexec.exe 2 2->21         started        process3 file4 128 C:\Windows\Installer\MSIE90C.tmp, PE32 14->128 dropped 130 C:\Windows\Installer\MSIE774.tmp, PE32 14->130 dropped 132 C:\Windows\Installer\MSIE735.tmp, PE32 14->132 dropped 134 4 other malicious files 14->134 dropped 23 aipackagechainer.exe 1 3 14->23         started        26 msiexec.exe 33 14->26         started        28 MSBuild.exe 17->28         started        30 MSBuild.exe 19->30         started        process5 file6 110 C:\Users\user\AppData\Local\...\AI_F78C.ps1, ASCII 23->110 dropped 32 Vista Software.exe 2 23->32         started        35 powershell.exe 2 21 23->35         started        112 C:\Users\user\...\aipackagechainer.exe, PE32 26->112 dropped 114 C:\Users\user\AppData\...\Vista Software.exe, PE32 26->114 dropped 116 C:\Users\user\AppData\...\file_deleter.ps1, ASCII 26->116 dropped process7 file8 104 C:\Users\user\AppData\...\Vista Software.tmp, PE32 32->104 dropped 38 Vista Software.tmp 3 4 32->38         started        41 conhost.exe 32->41         started        43 tasklist.exe 32->43         started        45 find.exe 32->45         started        148 Found many strings related to Crypto-Wallets (likely being stolen) 35->148 47 powershell.exe 11 35->47         started        49 powershell.exe 35->49         started        51 conhost.exe 35->51         started        signatures9 process10 file11 108 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 38->108 dropped 53 Vista Software.exe 2 38->53         started        56 conhost.exe 47->56         started        58 conhost.exe 49->58         started        process12 file13 106 C:\Users\user\AppData\...\Vista Software.tmp, PE32 53->106 dropped 60 Vista Software.tmp 18 9 53->60         started        process14 file15 120 C:\Users\user\AppData\...\file.exe (copy), PE32 60->120 dropped 122 C:\Users\user\AppData\...\unins000.exe (copy), PE32 60->122 dropped 124 C:\Users\user\AppData\Local\...\is-AA44E.tmp, PE32 60->124 dropped 126 2 other files (none is malicious) 60->126 dropped 63 file.exe 60->63         started        66 cmd.exe 60->66         started        68 cmd.exe 60->68         started        70 4 other processes 60->70 process16 signatures17 164 Found many strings related to Crypto-Wallets (likely being stolen) 63->164 72 cmd.exe 63->72         started        75 conhost.exe 66->75         started        77 tasklist.exe 66->77         started        79 find.exe 66->79         started        81 conhost.exe 68->81         started        83 tasklist.exe 68->83         started        85 find.exe 68->85         started        87 conhost.exe 70->87         started        89 8 other processes 70->89 process18 signatures19 158 Uses ping.exe to sleep 72->158 160 Uses ping.exe to check the status of other devices and networks 72->160 91 file.exe 72->91         started        95 PING.EXE 72->95         started        98 conhost.exe 72->98         started        process20 dnsIp21 118 C:\dbgbkfc\AutoIt3.exe, PE32 91->118 dropped 162 Creates autostart registry keys with suspicious names 91->162 100 MSBuild.exe 91->100         started        138 127.0.0.1 unknown unknown 95->138 file22 signatures23 process24 dnsIp25 136 167.114.47.186, 49984, 56001 OVHFR Canada 100->136 150 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 100->150 152 Found many strings related to Crypto-Wallets (likely being stolen) 100->152 154 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 100->154 156 4 other signatures 100->156 signatures26

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          740d3a.msi13%ReversingLabs
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\is-B174P.tmp\_isetup\_setup64.tmp0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\is-SB6EB.tmp\_isetup\_setup64.tmp0%ReversingLabs
          C:\Users\user\AppData\Local\clithe\file.exe (copy)0%ReversingLabs
          C:\Users\user\AppData\Local\clithe\is-3O9ML.tmp0%ReversingLabs
          C:\Users\user\AppData\Local\clithe\is-AA44E.tmp0%ReversingLabs
          C:\Users\user\AppData\Local\clithe\unins000.exe (copy)0%ReversingLabs
          C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe21%ReversingLabs
          C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe0%ReversingLabs
          C:\Windows\Installer\MSIE24F.tmp0%ReversingLabs
          C:\Windows\Installer\MSIE4A1.tmp0%ReversingLabs
          C:\Windows\Installer\MSIE696.tmp0%ReversingLabs
          C:\Windows\Installer\MSIE6E6.tmp0%ReversingLabs
          C:\Windows\Installer\MSIE735.tmp0%ReversingLabs
          C:\Windows\Installer\MSIE774.tmp0%ReversingLabs
          C:\Windows\Installer\MSIE90C.tmp0%ReversingLabs
          C:\dbgbkfc\AutoIt3.exe0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          bg.microsoft.map.fastly.net
          199.232.214.172
          truefalse
            high
            s-part-0017.t-0009.t-msedge.net
            13.107.246.45
            truefalse
              high
              fp2e7a.wpc.phicdn.net
              192.229.221.95
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUVista Software.exe, 00000005.00000000.2160371198.0000000000A21000.00000020.00000001.01000000.00000006.sdmpfalse
                  high
                  http://nuget.org/NuGet.exepowershell.exe, 00000008.00000002.2297404851.0000000005F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2277059050.0000000005ED7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://stackoverflow.com/q/14436606/23354MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000F.00000002.2250253596.00000000050E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2294302835.00000000075AD000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://aka.ms/pscore6lBpowershell.exe, 00000008.00000002.2255750077.0000000004EF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2247764460.0000000004E71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2250253596.0000000004F61000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000F.00000002.2250253596.00000000050E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2294302835.00000000075AD000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/2152978/23354rCannotMSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.remobjects.com/psVista Software.exe, 00000005.00000003.2167669347.000000007F84B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000005.00000003.2164502504.000000000315F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 00000006.00000000.2170071258.0000000000041000.00000020.00000001.01000000.00000007.sdmp, Vista Software.tmp, 0000000A.00000000.2193818046.000000000097D000.00000020.00000001.01000000.00000009.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://nuget.org/nuget.exepowershell.exe, 00000008.00000002.2297404851.0000000005F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2277059050.0000000005ED7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.innosetup.com/Vista Software.exe, 00000005.00000003.2167669347.000000007F84B000.00000004.00001000.00020000.00000000.sdmp, Vista Software.exe, 00000005.00000003.2164502504.000000000315F000.00000004.00001000.00020000.00000000.sdmp, Vista Software.tmp, 00000006.00000000.2170071258.0000000000041000.00000020.00000001.01000000.00000007.sdmp, Vista Software.tmp, 0000000A.00000000.2193818046.000000000097D000.00000020.00000001.01000000.00000009.sdmpfalse
                                        high
                                        https://contoso.com/Licensepowershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dllMSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Iconpowershell.exe, 0000000F.00000002.2275179676.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.autoitscript.com/autoit3/XVista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000027.00000000.2268475312.00000000003A5000.00000002.00000001.01000000.0000000B.sdmp, file.exe, 0000002D.00000000.2921494238.00000000003A5000.00000002.00000001.01000000.0000000B.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000000.3052534350.0000000000E25000.00000002.00000001.01000000.0000000D.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpfalse
                                                high
                                                https://www.autoitscript.com/autoit3/Vista Software.tmp, 0000000A.00000003.2269602416.0000000007DAF000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962836146.00000000041E7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000002.2966905904.0000000004015000.00000004.00001000.00020000.00000000.sdmp, file.exe, 0000002D.00000003.2962972483.00000000040FB000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000002.3108575212.00000000046C5000.00000004.00001000.00020000.00000000.sdmp, AutoIt3.exe, 0000002F.00000003.3104547290.00000000047AB000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000008.00000002.2255750077.0000000004EF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.2247764460.0000000004E71000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2250253596.0000000004F61000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000002E.00000002.3385347681.0000000003070000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://github.com/Pester/Pesterpowershell.exe, 0000000F.00000002.2250253596.00000000050E2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2294302835.00000000075AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exeMSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exeMSBuild.exe, 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          167.114.47.186
                                                          unknownCanada
                                                          16276OVHFRtrue
                                                          IP
                                                          127.0.0.1
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1559267
                                                          Start date and time:2024-11-20 11:15:12 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 12m 15s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:51
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:740d3a.msi
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winMSI@82/60@0/2
                                                          EGA Information:
                                                          • Successful, ratio: 50%
                                                          HCA Information:
                                                          • Successful, ratio: 99%
                                                          • Number of executed functions: 133
                                                          • Number of non-executed functions: 197
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .msi
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded IPs from analysis (whitelisted): 40.113.110.67, 20.12.23.50, 192.229.221.95, 20.3.187.198, 199.232.214.172, 13.85.23.206
                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, wns.notify.trafficmanager.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                          • Execution Graph export aborted for target MSBuild.exe, PID 5896 because it is empty
                                                          • Execution Graph export aborted for target powershell.exe, PID 6040 because it is empty
                                                          • Execution Graph export aborted for target powershell.exe, PID 6640 because it is empty
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Report size getting too big, too many NtOpenFile calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          • VT rate limit hit for: 740d3a.msi
                                                          TimeTypeDescription
                                                          05:16:12API Interceptor1x Sleep call for process: Vista Software.tmp modified
                                                          05:16:12API Interceptor46x Sleep call for process: powershell.exe modified
                                                          05:17:33API Interceptor251x Sleep call for process: MSBuild.exe modified
                                                          11:17:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce eeacadf "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                                          11:17:36AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce eeacadf "C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          167.114.47.186Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            s-part-0017.t-0009.t-msedge.netReminder.exeGet hashmaliciousPureCrypterBrowse
                                                            • 13.107.246.45
                                                            file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                            • 13.107.246.45
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 13.107.246.45
                                                            CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                            • 13.107.246.45
                                                            https://www.google.ca/url?q=30NUMBER&rct=77151727248916238810&sa=t&url=amp/s/estudioit.cl/starl/%23YW5nZWxhLmhvZGdzb25AMnNmZy5jb20=Get hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            invoice.exeGet hashmaliciousFormBookBrowse
                                                            • 13.107.246.45
                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                            • 13.107.246.45
                                                            215.exeGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            213.exeGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            212.exeGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            fp2e7a.wpc.phicdn.netReminder.exeGet hashmaliciousPureCrypterBrowse
                                                            • 192.229.221.95
                                                            212.exeGet hashmaliciousUnknownBrowse
                                                            • 192.229.221.95
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 192.229.221.95
                                                            6GvQSVIEIu.exeGet hashmaliciousUnknownBrowse
                                                            • 192.229.221.95
                                                            NW_EmployerNewsletter_11142024_pdf.htmlGet hashmaliciousUnknownBrowse
                                                            • 192.229.221.95
                                                            gggghh.exeGet hashmaliciousFormBookBrowse
                                                            • 192.229.221.95
                                                            file.exeGet hashmaliciousRemcosBrowse
                                                            • 192.229.221.95
                                                            https://www.amtso.org/check-desktop-phishing-page/Get hashmaliciousUnknownBrowse
                                                            • 192.229.221.95
                                                            FACTURA 4377.exeGet hashmaliciousUnknownBrowse
                                                            • 192.229.221.95
                                                            WEqMZ4qrbX.dllGet hashmaliciousUnknownBrowse
                                                            • 192.229.221.95
                                                            bg.microsoft.map.fastly.netgoodtoseeuthatgreatthingswithentirethingsgreatfor.htaGet hashmaliciousCobalt Strike, LokibotBrowse
                                                            • 199.232.210.172
                                                            MyInstaller_PDFGear.exeGet hashmaliciousUnknownBrowse
                                                            • 199.232.210.172
                                                            PO-000041492.xlsGet hashmaliciousUnknownBrowse
                                                            • 199.232.214.172
                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                            • 199.232.214.172
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 199.232.210.172
                                                            Benefit Enrollment -wZ5nusm.pdfGet hashmaliciousUnknownBrowse
                                                            • 199.232.214.172
                                                            6GvQSVIEIu.exeGet hashmaliciousUnknownBrowse
                                                            • 199.232.210.172
                                                            Benefit Enrollment -eGz8VNb.pdfGet hashmaliciousUnknownBrowse
                                                            • 199.232.214.172
                                                            217469812STM.pdfGet hashmaliciousScreenConnect Tool, PhisherBrowse
                                                            • 199.232.210.172
                                                            file.exeGet hashmaliciousRemcosBrowse
                                                            • 199.232.214.172
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            OVHFRReminder.exeGet hashmaliciousPureCrypterBrowse
                                                            • 167.114.47.186
                                                            IBKB.vbsGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                            • 51.195.88.199
                                                            arm.nn-20241120-0508.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 51.79.4.49
                                                            x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                            • 147.135.236.178
                                                            https://usapress.info/inside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years/Get hashmaliciousUnknownBrowse
                                                            • 54.38.113.5
                                                            https://l.facebook.com/l.php?u=https%3A%2F%2Fusapress.info%2Finside-the-last-words-of-dan-haggerty-aka-grizzly-adams-and-why-he-had-to-pull-the-plug-on-his-wife-of-20-years%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0r3IVxCUPtQPPqP5Ce0_adoAsiHgG3Oy1cYDq3k1JXBIrTGLtjToxlazM_aem_q02YsKkKY0QB_fm5suzUDw&h=AT1Xo_CkNlagO29_sds-m5zdTBZ6-H70m0J__7wjjmSNinwNGqBfRUFK3cH2zXJWNO7msrJPRkNulrkTmUCLkRNMcfCJTNK-cs4SfUQyRy7nw3vP1DNmFisBvlttaen8fHfi-N3lXN_BGQgdBw&__tn__=R%5D-R&c%5B0%5D=AT3euz91upHKeMVK8p24ktUFKClJ0GKt_3lJnV9tGakx0Tro3u7Ymk1z4tOG4eBZxcuD-Ny10eAla4iUyfdG04Fh4GryHwAMuELGG4dQctfWKiu4mfB-eLJ8Qktnq0ptzD_TaZEPEMHQnvP4W65jDpc-XBmWlMSmaRM-2soPhaPGYAODWegqP8h47S90Q2hmwQvQgUDdb35OgV1duzzqudMAyOk7e8E7mfpnrlwhIvWwUkK53AUNuPTqYkQGet hashmaliciousUnknownBrowse
                                                            • 54.38.113.3
                                                            exe009.exeGet hashmaliciousEmotetBrowse
                                                            • 54.38.143.245
                                                            RFQ_TFS-1508-AL NASR userING.exeGet hashmaliciousRedLineBrowse
                                                            • 193.70.111.186
                                                            https://t.co/D4HGMmKLnLGet hashmaliciousUnknownBrowse
                                                            • 51.222.206.130
                                                            bPRQRIfbbq.exeGet hashmaliciousUnknownBrowse
                                                            • 147.135.31.134
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            28a2c9bd18a11de089ef85a160da29e4Reminder.exeGet hashmaliciousPureCrypterBrowse
                                                            • 13.107.246.45
                                                            file.exeGet hashmaliciousPureCrypter, LummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                            • 13.107.246.45
                                                            https://orbistravelassistance.page/app/pages/login.phpGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            http://mt6j71.p1keesoulharmony.com/Get hashmaliciousHTMLPhisher, EvilProxyBrowse
                                                            • 13.107.246.45
                                                            https://files-pdf-73j.pages.dev/?e=info@camida.comGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            file.exeGet hashmaliciousLummaCBrowse
                                                            • 13.107.246.45
                                                            Doc_Comprovativo_Novembro_xoyx_18-11-2024_79.htmlGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                            • 13.107.246.45
                                                            https://c9amf220.caspio.com/dp/3ba5e0002add93b7ba4f4d22b51dGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            https://www.google.ca/url?q=30NUMBER&rct=77151727248916238810&sa=t&url=amp/s/estudioit.cl/starl/%23YW5nZWxhLmhvZGdzb25AMnNmZy5jb20=Get hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            http://load.webdatahoster.comGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            C:\Users\user\AppData\Local\Temp\is-B174P.tmp\_isetup\_setup64.tmpReminder.exeGet hashmaliciousPureCrypterBrowse
                                                              reservation .exeGet hashmaliciousTVratBrowse
                                                                reservation .exeGet hashmaliciousTVratBrowse
                                                                  oZ3vtWXObB.exeGet hashmaliciousTVratBrowse
                                                                    wjpP1EOX0L.exeGet hashmaliciousTVratBrowse
                                                                      PkWnPA8l7C.exeGet hashmaliciousDBatLoader, TVratBrowse
                                                                        oZ3vtWXObB.exeGet hashmaliciousTVratBrowse
                                                                          wjpP1EOX0L.exeGet hashmaliciousTVratBrowse
                                                                            1.exeGet hashmaliciousDBatLoader, TVratBrowse
                                                                              1.exeGet hashmaliciousDBatLoader, TVratBrowse
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):9435
                                                                                Entropy (8bit):5.579893777524464
                                                                                Encrypted:false
                                                                                SSDEEP:192:5YdeqI1U9NZOITNZOk4m3MYpBlEfQ/4puLpCdT7XppA:5F1UZfZb4m8YpBifQ/4p5dT7XppA
                                                                                MD5:B14415AB2C65E50F4D98D2C1B5DDB2F2
                                                                                SHA1:1E7875E0E97CAB89F70281F70C6DEE281636A4F2
                                                                                SHA-256:13D90EC4551A595D1A4AE9DC738BAE9ABF78C81A3B51A8BEC7CC8EA93E45B3B7
                                                                                SHA-512:6EBB0EEE0C349721726159136B6D2838AC884C78E266DF76230886082AD0A385E49D43AD2DF5CC55E94C7506622662E456639437321BB763D82ACA717FD66855
                                                                                Malicious:false
                                                                                Preview:...@IXOS.@.....@.*tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{2DB80D4A-91C8-4B46-99C2-BAAC7C0B3006}&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}.@......&.{C7A8C515-ACD3-4411-99AD-EAD9719AE9CF}&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}.@......&.{2DE3D436-1DE1-417A-9EA0-E82AF8BF7D62}&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}.@........CreateFolders..Creating folders..Folder: [1]#.@.C:\Users\user\AppData\Roaming\Your Company\Your Application\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@....&.Software\Your Company\Your Application...@....(.&...Version..1.0.0'.&...Path@.C:\Users\user\AppData
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:modified
                                                                                Size (bytes):399
                                                                                Entropy (8bit):4.948377753553006
                                                                                Encrypted:false
                                                                                SSDEEP:6:Ea3LMmoe/gReRY+Jy8QVkBMhiYBlSzVq2olnl/hkBdtsuRkYRsj9Yq:EgEOgRGYdTdhTSzVYnl/hitft2/
                                                                                MD5:483C5B606977D63561703617F5C4F1B7
                                                                                SHA1:865826D3C322F5BF4156F496C3E5E1472DDACB7C
                                                                                SHA-256:35FCDBF9929C5C8ADDF879A8200CCDDED73751FE8F15D4F9ECD5A3D532CEE019
                                                                                SHA-512:7A2E9842E8019C981654BA82F6C782D79A6F7624F657D0A4E6B725AFB432809CCA8789AAA48ACF76F311EC3F3DB3E34003A8EFEABA647FDA7B405E5FC395FBF4
                                                                                Malicious:false
                                                                                Preview:...@IXOS.@.....@.*tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....AI_LaunchChainer...@.....@.....@....
                                                                                Process:C:\Users\user\AppData\Local\clithe\file.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):532964
                                                                                Entropy (8bit):7.434809463000461
                                                                                Encrypted:false
                                                                                SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                                MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                                SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                                SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                                SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                                Malicious:false
                                                                                Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1400
                                                                                Entropy (8bit):5.344873306377427
                                                                                Encrypted:false
                                                                                SSDEEP:24:ML9E4KlKDE4KhKiKhRAE4KzetfE4KnKIE4oKNzKo9E4KhZsXE4qdKm:MxHKlYHKh3oRAHKzetfHKntHo6lHKmHA
                                                                                MD5:8255A4767725CC323842B221CEAFCBEE
                                                                                SHA1:537C8C5384748F137B339E39BC0A7FA90DBBC112
                                                                                SHA-256:7B368AA23DA44F0789862A83A2FA7BD40B1E1FB3C19E69005FAEA382DD0252F5
                                                                                SHA-512:C9B2DB6E3059872EEBF2DDBF2CE19A76D794C01D50E6A178108F5DAF29BA3B93DCF048C72A4414FAB83026BBE062C6DB5BA91657EF4706853A26980342E2CDD8
                                                                                Malicious:false
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=n
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):1336
                                                                                Entropy (8bit):5.437628337637955
                                                                                Encrypted:false
                                                                                SSDEEP:24:3TZJ0cYRSKco4KmBs4RPT6BmFoUebIKomjKcmZ9tJBJt/NK3R8IHrENU:V6xRSU4y4RQmFoUeWmfmZ9tJBLNWR8IR
                                                                                MD5:354E43915CD106410E93384F1DBF3469
                                                                                SHA1:5F198B1785438387E7A4082DDDD818BB696CA708
                                                                                SHA-256:1FCBBCF09B534C84D87087F8FE0CC15F4D7EB33E72E2477C77A85F7F80189ED6
                                                                                SHA-512:A63B11987A4BF3A2C5B5A130084859B15382106C9A5A1D014C1F781B2A3505C5D46C1A3A6EA0316E842382E4A6AE8D2482995D8E18BFE565CA1A399AD093EE99
                                                                                Malicious:false
                                                                                Preview:@...e................................................@..........L...............h..t...D.d.u.........!.Microsoft.PowerShell.ScheduledJob...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P................1]...E...........(.Microsoft.PowerShell.Command
                                                                                Process:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):23209
                                                                                Entropy (8bit):6.02302501724474
                                                                                Encrypted:false
                                                                                SSDEEP:384:gsurSpJjMPfBJZh+puH/aXAAtyIRWXISPVPXFtlMnOpkpNZRHbaQotu25tbJUuqS:IOpJjMPfBjhj/HkutPXFtleJ3F1oUaJL
                                                                                MD5:467774A57E387C18B5962AEAB412CDF5
                                                                                SHA1:15E5B916C5251A2D58CCA07381860A22E34BF1A5
                                                                                SHA-256:C57C9CE36B104FEBA7B9E0CAD5D37090C87CB3E351EDE658D1000B66ACAD24D9
                                                                                SHA-512:0C821543528827BE0D845421905551B07073D9ACBF7E4BC9F386B4808192E4BD28C27CF86ACCB4F7820F68829A0F4BF311BFE7A10B1388D8B385311A157430DB
                                                                                Malicious:true
                                                                                Preview:param(.. [Parameter(Mandatory = $true)].. [string[]]$paths,.. [int]$retry_count = 0..)....# Delete paths using parallel jobs. ..$jobs = $paths | ForEach-Object {.. Start-Job -ScriptBlock {.. param(.. [string]$path,.. [int]$retry_count = 0.. ).... if (Test-Path -LiteralPath $path) {.. $count = 0.. while ($true) {.. Remove-Item -LiteralPath $path -Force.. if (-not (Test-Path -LiteralPath $path) -or ($count -ge $retry_count)) {.. return;.. }.. $count++.. Start-Sleep -s 5 #sleep 5 seconds.. } .. }.. } -ArgumentList $_, $retry_count ..}....# Wait for the delete jobs to finish..Wait-Job -Job $jobs....# Self delete..Remove-Item -Path $MyInvocation.MyCommand.Source....# SIG # Begin signature block..# MII9bwYJKoZIhvcNAQcCoII9YDCCPVwCAQExDzANBglghkgBZQMEAgEFADB5Bgor..# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMC
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3615232
                                                                                Entropy (8bit):6.746330366445845
                                                                                Encrypted:false
                                                                                SSDEEP:98304:7JYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh4:6VL/tnHGYiqlmhhhhhhhhhhhhhhhhhhq
                                                                                MD5:584586C0CF548DB94F76F124046D58D9
                                                                                SHA1:63BA86DC3AE44A60C315C29416EE89952F57DACF
                                                                                SHA-256:DD7B6FC3B236D3F6F5C8309B95A0748FEE3FA075E48F68DE381FD68210260FC2
                                                                                SHA-512:B3EF65AE20CA7992AF343397C68F8BE35A15437C24B35E878B9D349D5C9F6AF0FA8CB1BE4F8DA08DCBAD1D0C95DC36CED784F900696CF85F69C8D7A2148EA242
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp
                                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):6144
                                                                                Entropy (8bit):4.720366600008286
                                                                                Encrypted:false
                                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: Reminder.exe, Detection: malicious, Browse
                                                                                • Filename: reservation .exe, Detection: malicious, Browse
                                                                                • Filename: reservation .exe, Detection: malicious, Browse
                                                                                • Filename: oZ3vtWXObB.exe, Detection: malicious, Browse
                                                                                • Filename: wjpP1EOX0L.exe, Detection: malicious, Browse
                                                                                • Filename: PkWnPA8l7C.exe, Detection: malicious, Browse
                                                                                • Filename: oZ3vtWXObB.exe, Detection: malicious, Browse
                                                                                • Filename: wjpP1EOX0L.exe, Detection: malicious, Browse
                                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                                • Filename: 1.exe, Detection: malicious, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3615232
                                                                                Entropy (8bit):6.746330366445845
                                                                                Encrypted:false
                                                                                SSDEEP:98304:7JYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh4:6VL/tnHGYiqlmhhhhhhhhhhhhhhhhhhq
                                                                                MD5:584586C0CF548DB94F76F124046D58D9
                                                                                SHA1:63BA86DC3AE44A60C315C29416EE89952F57DACF
                                                                                SHA-256:DD7B6FC3B236D3F6F5C8309B95A0748FEE3FA075E48F68DE381FD68210260FC2
                                                                                SHA-512:B3EF65AE20CA7992AF343397C68F8BE35A15437C24B35E878B9D349D5C9F6AF0FA8CB1BE4F8DA08DCBAD1D0C95DC36CED784F900696CF85F69C8D7A2148EA242
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):6144
                                                                                Entropy (8bit):4.720366600008286
                                                                                Encrypted:false
                                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):943784
                                                                                Entropy (8bit):6.621472142472864
                                                                                Encrypted:false
                                                                                SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                                MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                                SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                                SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                                SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3639357
                                                                                Entropy (8bit):6.7334924639235485
                                                                                Encrypted:false
                                                                                SSDEEP:98304:zJYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhn:SVL/tnHGYiqlmhhhhhhhhhhhhhhhhhhh
                                                                                MD5:A502816878594E55FE6A4BF0383C9012
                                                                                SHA1:B37FD1BE34B7A76594240F60F226AE3CBD410AA3
                                                                                SHA-256:D4F4F74F71F52E6B17355B5ABEFDA78CFC9A5EB267213F4059922468C56B0277
                                                                                SHA-512:36C3C033E6E6C5B4D82CE5F5E6DFEC9D210B51ECF34A3DDBF3A3062FE27224D6824E15403B778D10A1C3C138450701BB6B0C8452794420F23FD8E5795FCDB7B7
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):532964
                                                                                Entropy (8bit):7.434809463000461
                                                                                Encrypted:false
                                                                                SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                                MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                                SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                                SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                                SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                                Malicious:false
                                                                                Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):943784
                                                                                Entropy (8bit):6.621472142472864
                                                                                Encrypted:false
                                                                                SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                                MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                                SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                                SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                                SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):61302
                                                                                Entropy (8bit):7.997489289281888
                                                                                Encrypted:true
                                                                                SSDEEP:1536:DuJTbCqFC3mhFOwLah/4qYkDwlCKA9J7lvUqHUkXun:CtblFbGwLa2kElnANcqHen
                                                                                MD5:F0ECA05CE9A3A95EB161E175654CBB49
                                                                                SHA1:65CF312004A77709C5181DF950F608AFBCAB92F7
                                                                                SHA-256:F50D9901798FB26B80F73685F340E769E16495E9CD7CD902321F474A11FECCB7
                                                                                SHA-512:EDEF43BD7565833C5033CE05CF611194BB6646465BC42F9A996A7C6C5AB6F90DF2E17A13DEC6DB45E1F402D25F6A168C9F2DEB17721D9ACF00769F2A83F3A2B8
                                                                                Malicious:false
                                                                                Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M....D....9..u2.+..^..R.a@.].F.e..EQi.,.......m..%......w4#.....f...\..z..})..4.m....vs.....f..b..O.?.I8..o...K.,.qn...D..................j.......j..kC.R......%x....}...q..U-...(....%....V..?p.h`...55.SZ_S.^q..x.....k>r0...O...9xe7y>.v.T...Ip... .o*z.`7G......i...{Z/....Nk...m.N......c)Y.`.37...i=..T..!..f.....'......b~....j..C...................j..m.....KF....5...x...(nU.j....06.f".].X.:..)...=.H.}.......$......G.............#=._.z.8..7.O..g}.a.Df!..v-."Yj...=c.#..t.E....*Yt].5M".......Q..w.^5.~.o.P....3.?A\U.......?..Cp.~....E.K...9....(...0.=}.{.t4+.o...X).H*.>. .)z.....)-^.....9.....M...#..8..x.....9.i..z.=#R.=i>0..X... M..J.......u.##....Ez....U...Z8..@u.Dj....Yu?.px........(.1.0.S..@......'E.........5.8..B.;..E..q.S...f,..Z?..O..\...#B;<qr6..pw.[D.].9.G%_...........e}! .mj..?....u..6....i]&1...e..-7(VQBo....Y..6..w.'..A..=f6w,+.?..F.tA(./...h.
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):532964
                                                                                Entropy (8bit):7.434809463000461
                                                                                Encrypted:false
                                                                                SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                                MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                                SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                                SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                                SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                                Malicious:false
                                                                                Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):61302
                                                                                Entropy (8bit):7.997489289281888
                                                                                Encrypted:true
                                                                                SSDEEP:1536:DuJTbCqFC3mhFOwLah/4qYkDwlCKA9J7lvUqHUkXun:CtblFbGwLa2kElnANcqHen
                                                                                MD5:F0ECA05CE9A3A95EB161E175654CBB49
                                                                                SHA1:65CF312004A77709C5181DF950F608AFBCAB92F7
                                                                                SHA-256:F50D9901798FB26B80F73685F340E769E16495E9CD7CD902321F474A11FECCB7
                                                                                SHA-512:EDEF43BD7565833C5033CE05CF611194BB6646465BC42F9A996A7C6C5AB6F90DF2E17A13DEC6DB45E1F402D25F6A168C9F2DEB17721D9ACF00769F2A83F3A2B8
                                                                                Malicious:false
                                                                                Preview:.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.M....D....9..u2.+..^..R.a@.].F.e..EQi.,.......m..%......w4#.....f...\..z..})..4.m....vs.....f..b..O.?.I8..o...K.,.qn...D..................j.......j..kC.R......%x....}...q..U-...(....%....V..?p.h`...55.SZ_S.^q..x.....k>r0...O...9xe7y>.v.T...Ip... .o*z.`7G......i...{Z/....Nk...m.N......c)Y.`.37...i=..T..!..f.....'......b~....j..C...................j..m.....KF....5...x...(nU.j....06.f".].X.:..)...=.H.}.......$......G.............#=._.z.8..7.O..g}.a.Df!..v-."Yj...=c.#..t.E....*Yt].5M".......Q..w.^5.~.o.P....3.?A\U.......?..Cp.~....E.K...9....(...0.=}.{.t4+.o...X).H*.>. .)z.....)-^.....9.....M...#..8..x.....9.i..z.=#R.=i>0..X... M..J.......u.##....Ez....U...Z8..@u.Dj....Yu?.px........(.1.0.S..@......'E.........5.8..B.;..E..q.S...f,..Z?..O..\...#B;<qr6..pw.[D.].9.G%_...........e}! .mj..?....u..6....i]&1...e..-7(VQBo....Y..6..w.'..A..=f6w,+.?..F.tA(./...h.
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:InnoSetup Log 64-bit clithe, version 0x418, 6401 bytes, 571345\37\user\, C:\Users\user\AppData\Local\clithe\376
                                                                                Category:dropped
                                                                                Size (bytes):6401
                                                                                Entropy (8bit):3.891384038866669
                                                                                Encrypted:false
                                                                                SSDEEP:96:831W8JbGyaB9MDIdOTOGO/OzOGIuTXdHOkQCcbcuJlEDA4MZAe2L958rHhH:831W8TaBdUSn2yGIuLdHmbP4DSm9cHR
                                                                                MD5:CFEF5BCEC2622BCA39246D3BD5A10D63
                                                                                SHA1:8B16C7E92A0CDFB6E3BD8A95B2F60C17301A9535
                                                                                SHA-256:ECD791918601B4E51D0B3929776034FF779770DE686D6FF24A505351091CC058
                                                                                SHA-512:902D5E8E566D8C38948B6B02895598437408789BE7E9A0102072E7A0A58D4C4CE2A6780EDCA7AEB241B13DBFEAA723F1529C0BAB8575AF3F06AFF16EEEE7DD5C
                                                                                Malicious:false
                                                                                Preview:Inno Setup Uninstall Log (b) 64-bit.............................reclosable......................................................................................................................clithe......................................................................................................................................!................................................................................................................z...........X................5.7.1.3.4.5......e.n.g.i.n.e.e.r......C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.c.l.i.t.h.e....................... ..............IFPS....%........................................................................................................ANYMETHOD.....................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TMAINFORM....TMAINFORM.........TUNINSTALLPROGRESSFORM....TUNINSTALLPROGRESSFORM.....................TFILETIME..................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3639357
                                                                                Entropy (8bit):6.7334924639235485
                                                                                Encrypted:false
                                                                                SSDEEP:98304:zJYVM+LtVt3P/KuG2ONG9iqLRQv3330+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhn:SVL/tnHGYiqlmhhhhhhhhhhhhhhhhhhh
                                                                                MD5:A502816878594E55FE6A4BF0383C9012
                                                                                SHA1:B37FD1BE34B7A76594240F60F226AE3CBD410AA3
                                                                                SHA-256:D4F4F74F71F52E6B17355B5ABEFDA78CFC9A5EB267213F4059922468C56B0277
                                                                                SHA-512:36C3C033E6E6C5B4D82CE5F5E6DFEC9D210B51ECF34A3DDBF3A3062FE27224D6824E15403B778D10A1C3C138450701BB6B0C8452794420F23FD8E5795FCDB7B7
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f..................*..d........*.......*...@...........................8...........@......@...................P,.n.....,.j:...P0......................,.<............................p,.......................,......@,.(....................text.....*.......*................. ..`.itext..$.....*..0....*............. ..`.data.........*.......*.............@....bss.....|....+..........................idata..j:....,..<...f+.............@....didata.(....@,.......+.............@....edata..n....P,.......+.............@..@.tls....X....`,..........................rdata..]....p,.......+.............@..@.reloc..<.....,.......+.............@..B.rsrc.......P0......./.............@..@.............04......`3.............@..@................
                                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3306790
                                                                                Entropy (8bit):7.790569470803338
                                                                                Encrypted:false
                                                                                SSDEEP:98304:/wREp+hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh7:90hhhhhhhhhhhhhhhhhhhhhhhhhhhhhj
                                                                                MD5:35135E7F357C522D07DDD87307C0345C
                                                                                SHA1:758A12358ED51E44E37F238070F9407B0A017FC4
                                                                                SHA-256:1503447C30588583377509F44B075E99019A59899CA8E2A4B36A6602B39D4DC7
                                                                                SHA-512:D9020A8771277B0108C2CE1ECD07204AFBC88C6B183EBE257FA90C080FE031657CF79346D39B645B1FF8D9AEEF0A926318380E80561DEB19AB584A65E34A9DB3
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L.....f.................t........................@..................................d_...@......@...................p..q....P..........<R...........K2.@)...........................................................R..\....`.......................text....V.......X.................. ..`.itext..d....p.......\.............. ..`.data...88.......:...x..............@....bss....Xr...............................idata.......P......................@....didata......`......................@....edata..q....p......................@..@.tls.....................................rdata..]...........................@..@.reloc..............................@..B.rsrc...<R.......T..................@..@....................................@..@................
                                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):895488
                                                                                Entropy (8bit):6.4269201931011315
                                                                                Encrypted:false
                                                                                SSDEEP:24576:qReoHhWiBkVLQ/8MRdK6C5gU1We373cGx18Zh0:QwVdh1WebcGL8Zh0
                                                                                MD5:2C0130F614EA8C240320EC47D0008EEA
                                                                                SHA1:B4DA50EBBE6ADE459974E0A199F5C780D5AD19F7
                                                                                SHA-256:B78A85120AFAF0C2B7A132ECDB8C2DAA5C18190CEEE3F2F7420C1EDEE205F957
                                                                                SHA-512:381386DF46A30EF457BC2A63E010DFD7C116029D79B79BB8BC9236EBA4B4D673A5D97A4C4E7F1B32604CE653973E9C52B8B0E37F529015D12B13D614DB7BAED4
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c.Rm'.<>'.<>'.<>W8??+.<>W89?..<>7=???.<>7=8?5.<>W88?<.<>7=9?N.<>W8:?&.<>W8=?>.<>'.=>.<>o<5?..<>o<.>&.<>'..>&.<>o<>?&.<>Rich'.<>........PE..L...6..f.........."....).\...J......PM.......p....@..........................P......I;....@............................................../......................p...@...p...........................p...@............p..H...4........................text....[.......\.................. ..`.rdata..Xd...p...f...`..............@..@.data....p..........................@....didat.......`......................@....fptable.....p......................@....rsrc..../.......0..................@..@.reloc..p...........................@..B................................................................................................................................................................................................................
                                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1476
                                                                                Entropy (8bit):3.4640389846399104
                                                                                Encrypted:false
                                                                                SSDEEP:24:Q+xMXor+8hXor/kPEE3XorRkPED5kPEcmXorRkPED5kPE9X7FDXorfzv:rx8JYenEnAnD5nc2AnD5nNZTg
                                                                                MD5:7B44AAA587D203438A70FE8A07E2C190
                                                                                SHA1:73D233DFEE1F5E56ED668328ED0C2ABEAA93EB9D
                                                                                SHA-256:5BD62FFEEFC9C43004BDE9B386398A399EBF10F05C5F0A620474D88C48D0429D
                                                                                SHA-512:1E020C5A736B6F38694C2F9C301872D9D31FBD3B82ECAB21DBCFB811EA5FA3BB86DC1AFCF561D37D8E6C57DDB9B1202C928467326F378DA83F2525F58B883369
                                                                                Malicious:false
                                                                                Preview:..[.G.e.n.e.r.a.l.O.p.t.i.o.n.s.].....O.p.t.i.o.n.s.=.b.h.....D.o.w.n.l.o.a.d.F.o.l.d.e.r.=.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.....E.x.t.r.a.c.t.i.o.n.F.o.l.d.e.r.=.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.....[.P.R.E.R.E.Q.U.I.S.I.T.E.S.].....A.p.p.1.=.V.i.s.t.a. .S.o.f.t.w.a.r.e.....[.A.p.p.1.].....S.e.t.u.p.F.i.l.e.=.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.r.e.r.e.q.u.i.s.i.t.e.s.\.V.i.s.t.a. .S.o.f.t.w.a.r.e.\.V.i.s.t.a. .S.o.f.t.w.a.r.e...e.x.e.....O.p.t.i.o.n.s.=.i.p.....[.P.R.E.R.E.Q._.C.H.A.I.N.E.R.].....C.l.e.a.n.u.p.F.i.l.e.s.=.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.Y.o.u.r. .C.o.m.p.a.n.y.\.Y.o.u.r. .A.p.p.l.i.c.a.t.i.o.n.\.p.
                                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):23209
                                                                                Entropy (8bit):6.02302501724474
                                                                                Encrypted:false
                                                                                SSDEEP:384:gsurSpJjMPfBJZh+puH/aXAAtyIRWXISPVPXFtlMnOpkpNZRHbaQotu25tbJUuqS:IOpJjMPfBjhj/HkutPXFtleJ3F1oUaJL
                                                                                MD5:467774A57E387C18B5962AEAB412CDF5
                                                                                SHA1:15E5B916C5251A2D58CCA07381860A22E34BF1A5
                                                                                SHA-256:C57C9CE36B104FEBA7B9E0CAD5D37090C87CB3E351EDE658D1000B66ACAD24D9
                                                                                SHA-512:0C821543528827BE0D845421905551B07073D9ACBF7E4BC9F386B4808192E4BD28C27CF86ACCB4F7820F68829A0F4BF311BFE7A10B1388D8B385311A157430DB
                                                                                Malicious:true
                                                                                Preview:param(.. [Parameter(Mandatory = $true)].. [string[]]$paths,.. [int]$retry_count = 0..)....# Delete paths using parallel jobs. ..$jobs = $paths | ForEach-Object {.. Start-Job -ScriptBlock {.. param(.. [string]$path,.. [int]$retry_count = 0.. ).... if (Test-Path -LiteralPath $path) {.. $count = 0.. while ($true) {.. Remove-Item -LiteralPath $path -Force.. if (-not (Test-Path -LiteralPath $path) -or ($count -ge $retry_count)) {.. return;.. }.. $count++.. Start-Sleep -s 5 #sleep 5 seconds.. } .. }.. } -ArgumentList $_, $retry_count ..}....# Wait for the delete jobs to finish..Wait-Job -Job $jobs....# Self delete..Remove-Item -Path $MyInvocation.MyCommand.Source....# SIG # Begin signature block..# MII9bwYJKoZIhvcNAQcCoII9YDCCPVwCAQExDzANBglghkgBZQMEAgEFADB5Bgor..# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMC
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {D5C03FE6-2CB0-44BC-9C72-3578CFB89255}, Number of Words: 10, Subject: Your Application, Author: Your Company, Name of Creating Application: Your Application, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Oct 20 20:36:44 2024, Last Saved Time/Date: Sun Oct 20 20:36:44 2024, Last Printed: Sun Oct 20 20:36:44 2024, Number of Pages: 450
                                                                                Category:dropped
                                                                                Size (bytes):6722560
                                                                                Entropy (8bit):7.310993946697638
                                                                                Encrypted:false
                                                                                SSDEEP:196608:E0hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhV:E8eHZC6kP
                                                                                MD5:64A6CF00B80FE77C16F6DA137DD7A9D1
                                                                                SHA1:F9365C7876AC8934A48237499CF8774FE78EA196
                                                                                SHA-256:630ACEFE136EA2E4BB95211A214E4829D8CB59D4D948B09221E61ACD278854BF
                                                                                SHA-512:FA1FCFB0E4CCE82656A377EF00FB4424860D40B6891FCA29AF240866EFDEC5A20BA16B615488252BE2B438E2415A068BD147A013AA140FE86E1EB061B4E1BC7C
                                                                                Malicious:false
                                                                                Preview:......................>...................g............................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...v.......|.......g.......;...<...=...>...?...@...A...B...C...D...E...F...G...H...j#..k#..l#..m#..n#..o#..p#..q#..r#..s#..t#..u#..v#..w#..x#..y#..d+..e+..f+..g+..h+..i+..j+..k+..l+..m+..n+..o+..p+..q+..`2..w........................................2..............................................................................................................................................................................................................................<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {D5C03FE6-2CB0-44BC-9C72-3578CFB89255}, Number of Words: 10, Subject: Your Application, Author: Your Company, Name of Creating Application: Your Application, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Oct 20 20:36:44 2024, Last Saved Time/Date: Sun Oct 20 20:36:44 2024, Last Printed: Sun Oct 20 20:36:44 2024, Number of Pages: 450
                                                                                Category:dropped
                                                                                Size (bytes):6722560
                                                                                Entropy (8bit):7.310993946697638
                                                                                Encrypted:false
                                                                                SSDEEP:196608:E0hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhV:E8eHZC6kP
                                                                                MD5:64A6CF00B80FE77C16F6DA137DD7A9D1
                                                                                SHA1:F9365C7876AC8934A48237499CF8774FE78EA196
                                                                                SHA-256:630ACEFE136EA2E4BB95211A214E4829D8CB59D4D948B09221E61ACD278854BF
                                                                                SHA-512:FA1FCFB0E4CCE82656A377EF00FB4424860D40B6891FCA29AF240866EFDEC5A20BA16B615488252BE2B438E2415A068BD147A013AA140FE86E1EB061B4E1BC7C
                                                                                Malicious:false
                                                                                Preview:......................>...................g............................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...v.......|.......g.......;...<...=...>...?...@...A...B...C...D...E...F...G...H...j#..k#..l#..m#..n#..o#..p#..q#..r#..s#..t#..u#..v#..w#..x#..y#..d+..e+..f+..g+..h+..i+..j+..k+..l+..m+..n+..o+..p+..q+..`2..w........................................2..............................................................................................................................................................................................................................<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1021792
                                                                                Entropy (8bit):6.608380087035959
                                                                                Encrypted:false
                                                                                SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1021792
                                                                                Entropy (8bit):6.608380087035959
                                                                                Encrypted:false
                                                                                SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1021792
                                                                                Entropy (8bit):6.608380087035959
                                                                                Encrypted:false
                                                                                SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1021792
                                                                                Entropy (8bit):6.608380087035959
                                                                                Encrypted:false
                                                                                SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1021792
                                                                                Entropy (8bit):6.608380087035959
                                                                                Encrypted:false
                                                                                SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):908128
                                                                                Entropy (8bit):6.595002426238024
                                                                                Encrypted:false
                                                                                SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):2255
                                                                                Entropy (8bit):5.691480201534586
                                                                                Encrypted:false
                                                                                SSDEEP:24:NTgIw1SzVaRu6RwIxKmBFpiy1n5extS4WZpUqJYDhiS3rQ+xtAmSXkXZwaniXSPb:Z9zVQRxBjS0ZYD8SBgeqanNb7NGbEC0N
                                                                                MD5:386B61D30FAA962B1EAE88987789A11F
                                                                                SHA1:47A400EC6A67C209CD259C9B9ABC01ABB06DA1FE
                                                                                SHA-256:CCE6854C4D6E41668236E97B227C63069AA5C043C0D5847C9F99088BA973DE6A
                                                                                SHA-512:D84F6E7C629A5DCC7A4D4123D58C6808925D7D58BF738F681480705ABBC056CD7BCE5955664C101972763BB701305B116CB0B50B85A1DD138569E80C2FD46929
                                                                                Malicious:false
                                                                                Preview:...@IXOS.@.....@.*tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{2DB80D4A-91C8-4B46-99C2-BAAC7C0B3006}@.C:\Users\user\AppData\Roaming\Your Company\Your Application\.@.......@.....@.....@......&.{C7A8C515-ACD3-4411-99AD-EAD9719AE9CF}2.01:\Software\Your Company\Your Application\Version.@.......@.....@.....@......&.{2DE3D436-1DE1-417A-9EA0-E82AF8BF7D62}j.01:\Software\Caphyon\Advanced Installer\Prereqs\{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}\1.0.0\VISTASOFTWARE.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".@.C:\Users\user\AppData\Roaming\Your Company\Your Application\.@...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):908128
                                                                                Entropy (8bit):6.595002426238024
                                                                                Encrypted:false
                                                                                SSDEEP:24576:0yuK7uUCx0bzy5UrkfbDUtF4h0lhSMXlpGyFI/Yk6ibf7:0yuHHUtTZGyFI/Yk6ibf7
                                                                                MD5:ACCD9092A35E468E8AF934ACCD81E9F6
                                                                                SHA1:3751384E5E586481618002469190E3C1F271CE6D
                                                                                SHA-256:8339A5EE92E53A155828E58E7700FC17D4F3F8ECB11DAEB52AA1118BA3141ECD
                                                                                SHA-512:18E49E56AD2F78DB7F4BFABAB25CC3ECFCC8180BEEA8FF162A5D80BD0A6DB9EB598F9FA1D5167F078A12F382663A2B205D7E512370E4873A60955A174826E8E3
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...<..<..<..}?..<..}9...<.x?..<.x8..<..}8..<.x9...<..}:..<..}=..<..=...<..y5...<..y<..<..y...<.....<..y>..<.Rich..<.................PE..L......f.........."!...)............0W..............................................g.....@A.........................................p..h...............`=..............p...............................@.......................@....................text...j........................... ..`.rdata... ......."..................@..@.data...('... ......................@....didat..H....P......................@....fptable.....`......................@....rsrc...h....p......................@..@.reloc..............................@..B................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):545
                                                                                Entropy (8bit):5.173321434833674
                                                                                Encrypted:false
                                                                                SSDEEP:12:EgETgRGYdTdhTSzVYnl/hitftEkzX+HIBDZxSl:8TgIw1SzVaRkzXRdxW
                                                                                MD5:889167CB574C93A2F1BB1FC72C520E7F
                                                                                SHA1:8D36E9E1440454E38CA939111D2A609B795A63B5
                                                                                SHA-256:97073FDB58CE66231247F16021B6F6ED92B87266C3CCD240A2FCD35C77BFF252
                                                                                SHA-512:B7A274B0CCFF5825E42304C04B50373D6F66CAE144BB67BD7B4BDF71976C6924FE45710FEC65D5CEBC2327789F714793DCFEBFE3AF36B716D492E6EAE94D1E00
                                                                                Malicious:false
                                                                                Preview:...@IXOS.@.....@.*tY.@.....@.....@.....@.....@.....@......&.{4B67D172-7CB6-417D-AB01-03B1F8C9B55C}..Your Application..740d3a.msi.@.....@.....@.....@........&.{D5C03FE6-2CB0-44BC-9C72-3578CFB89255}.....@.....@.....@.....@.......@.....@.....@.......@......Your Application......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........AI_LaunchChainer....J...AI_LaunchChainer.@....b.C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe...@.....@.....@....
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.1621766568616767
                                                                                Encrypted:false
                                                                                SSDEEP:12:JSbX72FjQAGiLIlHVRpth/7777777777777777777777777vDHFC67XKpSl0i8Q:JKQI5pR7XoF
                                                                                MD5:104C357E39ED16A1FDB592DE09189B99
                                                                                SHA1:08FCEB110ADE668ED5BA18A0543CD64EB5A17BC4
                                                                                SHA-256:A52051B156C52B24FDCC72AE6FBB8A52558BF1127A164867445A3C2913462214
                                                                                SHA-512:38278DF7275F0A168AC8C6673274FB6CE7262AD96D551EA71BE7E7107DE16E3DFD7D4A5FC6ABB0A90B4080305AC084B3AFEDE55DB07416BD94D80C62EAF260A7
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.5642883760363335
                                                                                Encrypted:false
                                                                                SSDEEP:48:e8PhduRc06WXJaFT5y4fSihAEbCywpfSilyy/:Rhd1RFTc4KwC5
                                                                                MD5:B77CD824A2198EC2A22FE21611094B97
                                                                                SHA1:553224C7FFC689B21C22DB83E7ED1F53233307B6
                                                                                SHA-256:4B8C84599ACC2A18759BE8FE125D05B6D8EA0CF92BE96D6EAB15433959993867
                                                                                SHA-512:3E672A8AEE40D9136002074157A776D3D84C8671F7756010D40591044B15160D1B2021D50C56DA4805B11C3D1AC6851F9FD2AE671F75216C43513B12D7D71C2A
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):360001
                                                                                Entropy (8bit):5.362987602186364
                                                                                Encrypted:false
                                                                                SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaul:zTtbmkExhMJCIpEo
                                                                                MD5:FBB35085D6281490E8AF58DA6C1C86DA
                                                                                SHA1:091FDE70AC552E82FC797278B1D6994040F6A12F
                                                                                SHA-256:6BF867DCC34A149F8BC83421F1D7B07EF6A5BC3C27289702D080EA88AEA4AC9C
                                                                                SHA-512:9F14F5A7036AA0B04A56DFD302A2AE6B32D8F2822798D26827784B8D265D422D20508F0D2880258109845834E749F7E206C58282FBE5154E54DE520C9CD11B02
                                                                                Malicious:false
                                                                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):1.2545067952521851
                                                                                Encrypted:false
                                                                                SSDEEP:48:RalubO+CFXJLT5z4fSihAEbCywpfSilyy/:Ql3zT14KwC5
                                                                                MD5:EAF0FEBF62B62A18D0E34AE1FF63E6D8
                                                                                SHA1:45BDC6827C3F8583DA8D311C762DC8AD80086DEE
                                                                                SHA-256:E30D104A11C8E03B5A95ECAB9AE7A0E0C277B49C1965F463497537632F0D86D6
                                                                                SHA-512:F27846E2811122DAD2F3BE4861ADF1A39605F4AAABA9626A4954225DFB763750FD5EFCEABB52DA3C449A45F9777559B248CA657C65C20B0843564635CE6EC2EC
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):1.2545067952521851
                                                                                Encrypted:false
                                                                                SSDEEP:48:RalubO+CFXJLT5z4fSihAEbCywpfSilyy/:Ql3zT14KwC5
                                                                                MD5:EAF0FEBF62B62A18D0E34AE1FF63E6D8
                                                                                SHA1:45BDC6827C3F8583DA8D311C762DC8AD80086DEE
                                                                                SHA-256:E30D104A11C8E03B5A95ECAB9AE7A0E0C277B49C1965F463497537632F0D86D6
                                                                                SHA-512:F27846E2811122DAD2F3BE4861ADF1A39605F4AAABA9626A4954225DFB763750FD5EFCEABB52DA3C449A45F9777559B248CA657C65C20B0843564635CE6EC2EC
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):73728
                                                                                Entropy (8bit):0.13843974838632944
                                                                                Encrypted:false
                                                                                SSDEEP:24:x5yAB/5kXoIipVkXoSkXoIipVkXoKAEVkyjCywVgwGMWz8+khO:vyy/mfSiOfSihAEbCywf
                                                                                MD5:EE3F405EE3625346ED7816A2FD797D95
                                                                                SHA1:ABA968F67A78C7B346279C25EC10477C331532C0
                                                                                SHA-256:6574FE391A3EB99A61AA509DC45A456339EB000DE77D31CC9BB507E31F2D0E48
                                                                                SHA-512:38F1EAF16B6F75B8D15F08226DC1970B4C1BA7EB871417ADA71D899C8E8BB9DDFBF14CF8787F62A5F91BBEDC2E691CF07590C1DC13768501BFF7C16D2126E91F
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:modified
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):1.2545067952521851
                                                                                Encrypted:false
                                                                                SSDEEP:48:RalubO+CFXJLT5z4fSihAEbCywpfSilyy/:Ql3zT14KwC5
                                                                                MD5:EAF0FEBF62B62A18D0E34AE1FF63E6D8
                                                                                SHA1:45BDC6827C3F8583DA8D311C762DC8AD80086DEE
                                                                                SHA-256:E30D104A11C8E03B5A95ECAB9AE7A0E0C277B49C1965F463497537632F0D86D6
                                                                                SHA-512:F27846E2811122DAD2F3BE4861ADF1A39605F4AAABA9626A4954225DFB763750FD5EFCEABB52DA3C449A45F9777559B248CA657C65C20B0843564635CE6EC2EC
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):0.06913493440520613
                                                                                Encrypted:false
                                                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOCE0O7XpiYtQVky6lS:2F0i8n0itFzDHFC67XfS
                                                                                MD5:054515D24A534599AE0802B60903105F
                                                                                SHA1:F27A778DBA04930D1F8AB514957C692807DC1DFB
                                                                                SHA-256:140247C06F0F48A7A2D793A7F4C8ABFD30BFAECEEF0370DB1F5B9EAC4AA6E7B7
                                                                                SHA-512:0A2AF47BC3E9DEB6562F0B1039982FA0A8047BFE790A2DF09426F27CC08CFBADA7446BCF878E94D9D21BCA2961AB52F8BE57E34EFB13CF29CC9D8EBBA0FC2779
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.5642883760363335
                                                                                Encrypted:false
                                                                                SSDEEP:48:e8PhduRc06WXJaFT5y4fSihAEbCywpfSilyy/:Rhd1RFTc4KwC5
                                                                                MD5:B77CD824A2198EC2A22FE21611094B97
                                                                                SHA1:553224C7FFC689B21C22DB83E7ED1F53233307B6
                                                                                SHA-256:4B8C84599ACC2A18759BE8FE125D05B6D8EA0CF92BE96D6EAB15433959993867
                                                                                SHA-512:3E672A8AEE40D9136002074157A776D3D84C8671F7756010D40591044B15160D1B2021D50C56DA4805B11C3D1AC6851F9FD2AE671F75216C43513B12D7D71C2A
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.5642883760363335
                                                                                Encrypted:false
                                                                                SSDEEP:48:e8PhduRc06WXJaFT5y4fSihAEbCywpfSilyy/:Rhd1RFTc4KwC5
                                                                                MD5:B77CD824A2198EC2A22FE21611094B97
                                                                                SHA1:553224C7FFC689B21C22DB83E7ED1F53233307B6
                                                                                SHA-256:4B8C84599ACC2A18759BE8FE125D05B6D8EA0CF92BE96D6EAB15433959993867
                                                                                SHA-512:3E672A8AEE40D9136002074157A776D3D84C8671F7756010D40591044B15160D1B2021D50C56DA4805B11C3D1AC6851F9FD2AE671F75216C43513B12D7D71C2A
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):1.2545067952521851
                                                                                Encrypted:false
                                                                                SSDEEP:48:RalubO+CFXJLT5z4fSihAEbCywpfSilyy/:Ql3zT14KwC5
                                                                                MD5:EAF0FEBF62B62A18D0E34AE1FF63E6D8
                                                                                SHA1:45BDC6827C3F8583DA8D311C762DC8AD80086DEE
                                                                                SHA-256:E30D104A11C8E03B5A95ECAB9AE7A0E0C277B49C1965F463497537632F0D86D6
                                                                                SHA-512:F27846E2811122DAD2F3BE4861ADF1A39605F4AAABA9626A4954225DFB763750FD5EFCEABB52DA3C449A45F9777559B248CA657C65C20B0843564635CE6EC2EC
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\clithe\file.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):943784
                                                                                Entropy (8bit):6.621472142472864
                                                                                Encrypted:false
                                                                                SSDEEP:24576:MghN1a6pzWZ12+f+Qa7N4nEIRQ1hOOLkF6av8uh:vhN1aQzJD4BuTxavfh
                                                                                MD5:3F58A517F1F4796225137E7659AD2ADB
                                                                                SHA1:E264BA0E9987B0AD0812E5DD4DD3075531CFE269
                                                                                SHA-256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
                                                                                SHA-512:ACF740AAFCE390D06C6A76C84E7AE7C0F721731973AADBE3E57F2EB63241A01303CC6BF11A3F9A88F8BE0237998B5772BDAF569137D63BA3D0F877E7D27FC634
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......hm..,...,...,.....m.......o.......n.......[.-....h..8....h.......h..>...%t..%...%t......,........h..|....h..-....hc.-...,........h..-...Rich,...........................PE..L...R..Z.........."...............................@.......................................@...@.......@.........................|....P..h............J.......0.. v.........................../..........@............................................text............................... ..`.rdata..............................@..@.data...4p.......H..................@....rsrc...h....P......................@..@.reloc.. v...0...x..................@..B................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\clithe\file.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):532964
                                                                                Entropy (8bit):7.434809463000461
                                                                                Encrypted:false
                                                                                SSDEEP:12288:/Gulirt5PUlsJIG6QvzsHzdBD8Bf874LT49dbZXa1sLKj:/RliAZysHBBD8BfRObZXa1mKj
                                                                                MD5:B3BB51CF6BE5FBE8EBAA27F06DB4BDA7
                                                                                SHA1:E535B1B4A477ACB1068A4D019AA85A622AA48F4C
                                                                                SHA-256:40B6B58FBEB08A133B56E27C94B0AA7AF7862AFE386E9056744B06BA7B03BBAC
                                                                                SHA-512:A24FD46E30E8829A3CAF93D9B91D6B0A1FFA15E9B7A4F5684A540FC42C8545405E3DED9AF4C659849B806E3644963D3C7645B019AAB3F9311DA5674BD19B62DB
                                                                                Malicious:false
                                                                                Preview:["r...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................["r.....................................
                                                                                Process:C:\Windows\SysWOW64\PING.EXE
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):478
                                                                                Entropy (8bit):4.9404427828211634
                                                                                Encrypted:false
                                                                                SSDEEP:12:PKMRJpTeTeTeTeT0s+sEAFSkIrxMVlmJHaVzvv:/2fAokItULVDv
                                                                                MD5:1D785D889CA617298A68D26DFEF974C4
                                                                                SHA1:1CC36474033E2767B059019B12782CE558F1EA34
                                                                                SHA-256:FE52FE8317F9F07F4AB830F6E3B1F1013BE4AA2A82DD5C86AA805648FC053230
                                                                                SHA-512:EF34C2479BE5BA45B41584887354DE53EA15EC53EA74D57042FF57EB8A609B93DAC9A55297300C29320CE14966FB7704C9952BDC7C6E2DDD0DCA929884091CF3
                                                                                Malicious:false
                                                                                Preview:..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128....Ping statistics for 127.0.0.1:.. Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                                                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {D5C03FE6-2CB0-44BC-9C72-3578CFB89255}, Number of Words: 10, Subject: Your Application, Author: Your Company, Name of Creating Application: Your Application, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Oct 20 20:36:44 2024, Last Saved Time/Date: Sun Oct 20 20:36:44 2024, Last Printed: Sun Oct 20 20:36:44 2024, Number of Pages: 450
                                                                                Entropy (8bit):7.310993946697638
                                                                                TrID:
                                                                                • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                                • Microsoft Windows Installer (60509/1) 46.00%
                                                                                • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                                File name:740d3a.msi
                                                                                File size:6'722'560 bytes
                                                                                MD5:64a6cf00b80fe77c16f6da137dd7a9d1
                                                                                SHA1:f9365c7876ac8934a48237499cf8774fe78ea196
                                                                                SHA256:630acefe136ea2e4bb95211a214e4829d8cb59d4d948b09221e61acd278854bf
                                                                                SHA512:fa1fcfb0e4cce82656a377ef00fb4424860d40b6891fca29af240866efdec5a20ba16b615488252be2b438e2415a068bd147a013aa140fe86e1eb061b4e1bc7c
                                                                                SSDEEP:196608:E0hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhV:E8eHZC6kP
                                                                                TLSH:D366D02176CBC03AE16D06725679EB6E503FBD220B3154C7A3E4796D9D307C12A3AA4F
                                                                                File Content Preview:........................>...................g............................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4..
                                                                                Icon Hash:2d2e3797b32b2b99
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-11-20T11:17:34.367937+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1167.114.47.18656001192.168.2.649984TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Nov 20, 2024 11:16:00.921907902 CET49674443192.168.2.6173.222.162.64
                                                                                Nov 20, 2024 11:16:00.921911001 CET49673443192.168.2.6173.222.162.64
                                                                                Nov 20, 2024 11:16:01.203066111 CET49672443192.168.2.6173.222.162.64
                                                                                Nov 20, 2024 11:16:10.531184912 CET49674443192.168.2.6173.222.162.64
                                                                                Nov 20, 2024 11:16:10.531193972 CET49673443192.168.2.6173.222.162.64
                                                                                Nov 20, 2024 11:16:10.628014088 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:10.628051996 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:10.628127098 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:10.628515959 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:10.628535986 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:10.812439919 CET49672443192.168.2.6173.222.162.64
                                                                                Nov 20, 2024 11:16:11.289833069 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.290081978 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.300230980 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.300271034 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.300546885 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.311961889 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.355479002 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.416085005 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.416109085 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.416125059 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.416232109 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.416261911 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.416312933 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.500118971 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.500138998 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.500206947 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.500236988 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.500264883 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.500308990 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.502363920 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.502382040 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.502441883 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.502448082 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.502939939 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.587513924 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.587537050 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.587668896 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.587703943 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.589011908 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.589034081 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.589080095 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.589092016 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.589123011 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.590361118 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.590394020 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.590400934 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.590411901 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.590432882 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.590450048 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.590454102 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.590483904 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.591353893 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.591815948 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.591834068 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.591921091 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.591921091 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.591928959 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.596128941 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.682252884 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.682323933 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.682435989 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.682435989 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.682461023 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.683413982 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.683466911 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.683511019 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.683531046 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.683559895 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.683782101 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.685395956 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.685457945 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.685493946 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.685513020 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.685547113 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.685594082 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.687206984 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.687351942 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.687421083 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.687443018 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.687472105 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.687650919 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.688407898 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.688477039 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.688513994 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.688525915 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.688559055 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.688849926 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.689941883 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.689989090 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.690085888 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.690085888 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.690103054 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.690123081 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.690229893 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:11.690238953 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.690331936 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:11.690423012 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.336658001 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.337241888 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.337241888 CET49713443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.337291002 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.337320089 CET4434971313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.452507973 CET44349710173.222.162.64192.168.2.6
                                                                                Nov 20, 2024 11:16:12.452614069 CET49710443192.168.2.6173.222.162.64
                                                                                Nov 20, 2024 11:16:12.506448984 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.506519079 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.506592035 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.508140087 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.508239031 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.508311033 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.509922981 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.510006905 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.510086060 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.511126995 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.511162043 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.511215925 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.513572931 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.513596058 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.513650894 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.514100075 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.514133930 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.514173031 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.514189005 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.514262915 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.514281988 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.514415979 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.514446020 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:12.514564991 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:12.514600992 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.163640976 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.164562941 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.164653063 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.166249990 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.166264057 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.169323921 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.169809103 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.169827938 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.170259953 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.170275927 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.184875965 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.187350035 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.187386036 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.187891960 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.187900066 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.194969893 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.195791960 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.200998068 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.201102018 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.201437950 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.201452971 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.202907085 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.202925920 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.206886053 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.206892014 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.265384912 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.265455008 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.265588999 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.265872955 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.265872955 CET49718443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.265921116 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.265947104 CET4434971813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.270622015 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.270668030 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.270726919 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.270898104 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.270915031 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.271260023 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.271287918 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.271351099 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.271373987 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.271395922 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.271445990 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.271544933 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.271544933 CET49716443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.271560907 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.271579981 CET4434971613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.275466919 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.275500059 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.275738001 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.277122021 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.277132988 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.293720961 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.293744087 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.293908119 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.293929100 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.294251919 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.294307947 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.294377089 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.294393063 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.294404030 CET49717443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.294410944 CET4434971713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.297760963 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.297804117 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.297861099 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.298006058 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.298028946 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.304848909 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.304917097 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.304972887 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.305202961 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.305222988 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.305236101 CET49715443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.305243015 CET4434971513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.308065891 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.308084965 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.308146954 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.308319092 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.308329105 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.311669111 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.311726093 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.311795950 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.311814070 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.311855078 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.311880112 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.312014103 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.313678980 CET49714443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.313689947 CET4434971413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.317087889 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.317116976 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.317188025 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.317399025 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.317414045 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.849450111 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.849982023 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.849997044 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.850636959 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.850642920 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.935964108 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.939570904 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.939603090 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.940206051 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.940213919 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.951937914 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.952020884 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.952069044 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.952313900 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.952334881 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.952343941 CET49720443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.952356100 CET4434972013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.955992937 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.957442045 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.957468987 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.958015919 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.958023071 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.962421894 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.962543011 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.962582111 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.962714911 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.962856054 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.962866068 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.963012934 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.963278055 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.963284016 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.963543892 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.963557959 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.963833094 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.963849068 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:13.963927031 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:13.963929892 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.037142038 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.037239075 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.037298918 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.038687944 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.038714886 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.038731098 CET49719443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.038738012 CET4434971913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.056493998 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.056714058 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.056871891 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.062872887 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.062946081 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.063663006 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.064007998 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.064085960 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.065565109 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.100018024 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.100054979 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.100071907 CET49721443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.100080013 CET4434972113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.105849028 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.105859995 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.105871916 CET49723443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.105876923 CET4434972313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.106522083 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.106554031 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.106566906 CET49722443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.106574059 CET4434972213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.108268023 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.108341932 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.108414888 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.109452963 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.109492064 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.109555960 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.118571997 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.118611097 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.120795012 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.120805979 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.126579046 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.126631021 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.126708031 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.126833916 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.126847029 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.130614996 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.130626917 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.130753994 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.131957054 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.131973028 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.630565882 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.732692003 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.732708931 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.733249903 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.733258963 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.770874023 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.770925999 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.771871090 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.772133112 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.840830088 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.840967894 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:14.841506004 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.859354973 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.859380960 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.906311035 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:14.906311035 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.126070976 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.126120090 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.129092932 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.129101038 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.133416891 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.133452892 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.133939981 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.133951902 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.134181976 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.134181976 CET49724443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.134211063 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.134222031 CET4434972413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.135740042 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.135757923 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.136738062 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.136744022 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.137063980 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.137094975 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.137564898 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.137573957 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.225464106 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.225655079 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.226284981 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.233170986 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.233421087 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.233477116 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.234149933 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.234513998 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.234525919 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.234616995 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.234819889 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.234864950 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.271155119 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.271209002 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.271326065 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.273452044 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.273473978 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.273785114 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.273830891 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.273850918 CET49725443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.273859978 CET4434972513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.274131060 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.274139881 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.274151087 CET49728443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.274156094 CET4434972813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.281867981 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.281919956 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.282222033 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.282478094 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.282500029 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.282851934 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.282881021 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.282896042 CET49726443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.282903910 CET4434972613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.286072969 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.286094904 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.286109924 CET49727443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.286117077 CET4434972713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.362936020 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.362972975 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.363049030 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.378386021 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.378408909 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.392477036 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.392530918 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.392618895 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.392800093 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.392813921 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.395910025 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.395952940 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.396059036 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.396253109 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.396264076 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.918484926 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.935139894 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.935168982 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.935837030 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.935846090 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.942564011 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.943069935 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.943104029 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:15.943824053 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:15.943840027 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.035970926 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.036149025 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.036216021 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.044032097 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.055392027 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.055418015 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.055458069 CET49729443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.055468082 CET4434972913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.056605101 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.056684017 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.056787014 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.057346106 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.057374001 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.057390928 CET49730443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.057398081 CET4434973013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.058697939 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.058707952 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.059247971 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.059253931 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.061379910 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.063832998 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.063860893 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.064492941 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.064507961 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.072500944 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.072544098 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.072617054 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.073620081 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.073635101 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.074479103 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.074517012 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.074611902 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.075484991 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.075506926 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.075530052 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.075845003 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.075854063 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.076641083 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.076646090 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.165188074 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.165309906 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.165369987 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.166627884 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.166692972 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.166831017 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.175789118 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.175815105 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.175828934 CET49731443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.175834894 CET4434973113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.182842016 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.182934046 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.182998896 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.184580088 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.184602022 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.184613943 CET49732443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.184619904 CET4434973213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.193526030 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.193550110 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.193562984 CET49733443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.193569899 CET4434973313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.207679033 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.207725048 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.207803965 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.209398985 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.209496975 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.209562063 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.211021900 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.211035967 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.211968899 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.211985111 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.212039948 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.212141991 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.212153912 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.212323904 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.212332010 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.715594053 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.717137098 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.717152119 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.717952013 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.717957020 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.726861000 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.727648973 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.727663994 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.728394032 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.728398085 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.821805954 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.821871996 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.821995020 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.822500944 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.822530031 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.822572947 CET49735443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.822578907 CET4434973513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.830212116 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.830255032 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.830372095 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.830533981 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.830547094 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.838268042 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.838434935 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.838505030 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.838542938 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.838562012 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.838576078 CET49734443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.838581085 CET4434973413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.841615915 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.841681957 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.841782093 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.841927052 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.841948986 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.855529070 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.855952978 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.855964899 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.856437922 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.856441021 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.877621889 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.878012896 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.878037930 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.878436089 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.878441095 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.888488054 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.889122009 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.889128923 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.889834881 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.889837980 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.961271048 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.961322069 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.961374998 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.963025093 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.963038921 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.963048935 CET49736443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.963052988 CET4434973613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.973586082 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.973620892 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.974205971 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.983485937 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.983499050 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.988529921 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.988621950 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.988889933 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.988969088 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.988970041 CET49737443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:16.989013910 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:16.989041090 CET4434973713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.058404922 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.058461905 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.058581114 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.069880962 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.069911957 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.070991039 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.071053982 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.071130037 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.071280003 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.071290970 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.071305037 CET49738443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.071310043 CET4434973813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.102886915 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.102931023 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.103138924 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.103833914 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.103857040 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.470416069 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.471775055 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.471808910 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.472246885 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.472253084 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.491425037 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.492978096 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.493000984 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.493700027 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.493707895 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.569776058 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.569827080 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.569874048 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.570257902 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.570277929 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.570288897 CET49739443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.570293903 CET4434973913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.575426102 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.575448990 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.575530052 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.576065063 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.576076984 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.591459036 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.591605902 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.591677904 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.591798067 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.591798067 CET49740443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.591840982 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.591866016 CET4434974013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.594120026 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.594150066 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.594242096 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.594432116 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.594444036 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.618566036 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.622391939 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.622411966 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.622881889 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.622886896 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.704345942 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.723999977 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.724078894 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.724153042 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.737041950 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.737104893 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.737742901 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.737756968 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.738168955 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.738208055 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.738234997 CET49741443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.738250971 CET4434974113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.743638039 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.743731022 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.743807077 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.743997097 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.744019032 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.803656101 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.804332018 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.804362059 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.804703951 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.804709911 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.850471020 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.850552082 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.850661039 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.852469921 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.852526903 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.852557898 CET49742443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.852576017 CET4434974213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.858881950 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.858933926 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.858994007 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.859806061 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.859818935 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.953788042 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.953941107 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.954004049 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.955178976 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.955208063 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.955224037 CET49743443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.955230951 CET4434974313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.960062027 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.960108042 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:17.960221052 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.960453987 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:17.960470915 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.217473984 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.218115091 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.218153000 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.218622923 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.218631029 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.268909931 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.269493103 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.269526958 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.270145893 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.270152092 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.333667040 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.333744049 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.333914995 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.334099054 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.334099054 CET49744443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.334147930 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.334177971 CET4434974413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.337692022 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.337749004 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.338691950 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.339092970 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.339108944 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.373013973 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.373172998 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.373241901 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.373367071 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.373388052 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.373404026 CET49745443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.373409033 CET4434974513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.396898985 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.407088995 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.407136917 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.407744884 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.407763004 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.409537077 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.409588099 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.409729958 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.412100077 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.412127018 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.504980087 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.505054951 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.505186081 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.505470991 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.505512953 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.505538940 CET49746443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.505553961 CET4434974613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.509054899 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.509139061 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.509249926 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.509521961 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.509551048 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.511173964 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.511548042 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.511585951 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.512041092 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.512049913 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.614887953 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.614959955 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.615972042 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.616857052 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.616883993 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.616911888 CET49747443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.616918087 CET4434974713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.622864008 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.622909069 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.623337984 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.623656034 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.623673916 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.626851082 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.627819061 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.627819061 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.627847910 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.627886057 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.729898930 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.729960918 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.730035067 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.753009081 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.753009081 CET49748443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.753046989 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.753061056 CET4434974813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.777718067 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.777766943 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:18.777843952 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.779606104 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:18.779623985 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.007282019 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.014874935 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.014908075 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.016861916 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.016881943 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.057173014 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.058589935 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.058656931 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.059082031 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.059098005 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.116854906 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.116924047 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.117064953 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.120835066 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.120835066 CET49749443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.120887995 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.120918036 CET4434974913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.128802061 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.128846884 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.129213095 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.129796028 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.129817009 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.157505035 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.157697916 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.157798052 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.157843113 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.157843113 CET49750443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.157867908 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.157881021 CET4434975013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.166506052 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.166552067 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.166659117 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.167375088 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.167392015 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.181982994 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.182627916 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.182677984 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.183274031 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.183288097 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.266887903 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.272202015 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.272212982 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.272694111 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.272701025 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.293982983 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.294048071 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.294112921 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.294380903 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.294416904 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.294460058 CET49751443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.294476032 CET4434975113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.329601049 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.329648972 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.329713106 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.336534023 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.336546898 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.371335030 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.371433020 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.371598959 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.381432056 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.381449938 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.381470919 CET49752443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.381477118 CET4434975213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.429903984 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.449079037 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.449115038 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.449595928 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.449601889 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.498159885 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.498209000 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.498387098 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.509761095 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.509787083 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.548048019 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.548136950 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.548480034 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.549693108 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.549719095 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.549736977 CET49753443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.549743891 CET4434975313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.560308933 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.560349941 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.560414076 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.561922073 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.561939955 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.798271894 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.815330982 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.815330982 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.815359116 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.815373898 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.855202913 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.875797033 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.875829935 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.876290083 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.876295090 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.917979956 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.918045044 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.918431044 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.956366062 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.956366062 CET49754443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.956382990 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.956392050 CET4434975413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.980731964 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.980809927 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:19.980863094 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:19.991683006 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.041511059 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.041524887 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.041553020 CET49755443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.041558027 CET4434975513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.048746109 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.048774004 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.053433895 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.053438902 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.094296932 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.094342947 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.094418049 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.152129889 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.152178049 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.152216911 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.153984070 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.154004097 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.155874968 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.155901909 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.155971050 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.156102896 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.156116009 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.157239914 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.157257080 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.157270908 CET49757443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.157275915 CET4434975713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.170800924 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.176157951 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.176194906 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.176327944 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.197654963 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.197674036 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.198389053 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.198393106 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.199394941 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.199424982 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.213413954 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.213800907 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.213820934 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.214277983 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.214282990 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.296611071 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.296777010 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.296876907 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.297974110 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.297974110 CET49758443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.297991991 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.298001051 CET4434975813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.305624008 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.305668116 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.305756092 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.306530952 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.306548119 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.314255953 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.314327955 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.314378023 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.314562082 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.314578056 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.314588070 CET49759443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.314593077 CET4434975913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.317895889 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.317929983 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.317989111 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.318478107 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.318494081 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.791996956 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.826406956 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.832150936 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.832182884 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.832897902 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.832971096 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.832974911 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.832995892 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.833322048 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.833355904 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.842736959 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.843209028 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.843242884 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.844160080 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.844166994 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.933515072 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.933603048 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.933722019 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.940459013 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.940511942 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.940577030 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.954068899 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.954139948 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.954174995 CET49760443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.954195023 CET4434976013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.955749989 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.955777884 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.955779076 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.955805063 CET49762443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.955817938 CET4434976213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.958043098 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.958236933 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.958286047 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.960581064 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.967005968 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.967026949 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.967482090 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.967489004 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.971349001 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.971417904 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.971492052 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.971729994 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.971759081 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.972085953 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.972100019 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.972496033 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.972506046 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.972668886 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.972695112 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:20.972711086 CET49761443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:20.972717047 CET4434976113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.021367073 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.021445036 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.021524906 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.022665977 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.022708893 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.022928953 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.031100035 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.031136036 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.031286955 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.031301022 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.064414978 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.064623117 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.064683914 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.067980051 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.068125010 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.068191051 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.068419933 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.068440914 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.068453074 CET49763443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.068459034 CET4434976313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.089638948 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.089680910 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.089709044 CET49764443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.089724064 CET4434976413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.159276009 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.159323931 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.159437895 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.165663958 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.165713072 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.165930033 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.173264980 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.173283100 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.173496962 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.173526049 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.822109938 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.822727919 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.826018095 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.868439913 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.868493080 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.868907928 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.868916988 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.869141102 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.869157076 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.869378090 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.869421005 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.869601011 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.869616032 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.869870901 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.869884968 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.969448090 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.969593048 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.969605923 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.969679117 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.969846010 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.969906092 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.970777035 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.970969915 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.971055984 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.992887020 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.992887020 CET49767443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.992933035 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.992957115 CET4434976713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.993058920 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.993058920 CET49766443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.993110895 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.993134975 CET4434976613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.995630980 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.995630980 CET49768443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:21.995656013 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:21.995666981 CET4434976813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.004751921 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.004790068 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.004918098 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.006254911 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.006300926 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.006350994 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.007711887 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.007721901 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.007894993 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.007940054 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.007952929 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.008647919 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.008663893 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.009067059 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.009078026 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.016314030 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.016736984 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.016750097 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.017208099 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.017213106 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.017316103 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.017672062 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.017702103 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.018022060 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.018028021 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.115000010 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.115072966 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.115143061 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.115537882 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.115561008 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.115572929 CET49769443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.115577936 CET4434976913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.118913889 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.118952990 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.119008064 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.119755030 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.119766951 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.136848927 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.136905909 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.137010098 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.137439966 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.137440920 CET49770443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.137470961 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.137480974 CET4434977013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.139724970 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.139749050 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.139844894 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.140194893 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.140201092 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.662597895 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.664108992 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.664125919 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.673820972 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.673830986 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.686460972 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.687182903 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.687206030 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.687686920 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.687691927 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.696012020 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.696455956 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.696479082 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.696929932 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.696933985 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.774759054 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.774935961 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.774982929 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.775213003 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.775232077 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.775243998 CET49774443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.775249958 CET4434977413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.776699066 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.778726101 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.778760910 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.778821945 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.779149055 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.779181957 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.779616117 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.779624939 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.779942036 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.779958010 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.787044048 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.787414074 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.787446022 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.787875891 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.787883043 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.790374041 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.790545940 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.790597916 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.790620089 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.790628910 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.790638924 CET49772443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.790652990 CET4434977213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.792829990 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.792865038 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.792928934 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.793077946 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.793091059 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.802386999 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.802551031 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.802612066 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.802936077 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.802958965 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.802972078 CET49773443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.802978039 CET4434977313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.805541039 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.805567026 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.805669069 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.805793047 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.805809021 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.879962921 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.880120039 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.880183935 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.881141901 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.881165028 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.881176949 CET49775443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.881181955 CET4434977513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.884713888 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.884737968 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.884798050 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.884965897 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.884975910 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.890405893 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.890480995 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.890644073 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.890778065 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.890794039 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.890805006 CET49776443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.890810966 CET4434977613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.900168896 CET49781443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.900202990 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:22.900275946 CET49781443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.901264906 CET49781443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:22.901279926 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.444595098 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.445293903 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.445311069 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.445724964 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.445758104 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.445764065 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.446301937 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.446312904 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.446459055 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.446463108 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.472157955 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.476622105 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.476650000 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.477145910 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.477150917 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.550079107 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.550261974 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.550360918 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.550431013 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.550544024 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.550607920 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.562331915 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.562985897 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.562985897 CET49779443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.563009977 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.563020945 CET4434977913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.564932108 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.564932108 CET49777443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.564939976 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.564948082 CET4434977713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.567270994 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.570421934 CET49781443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.570441961 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.570883036 CET49781443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.570897102 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.571199894 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.571235895 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.571577072 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.571583033 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.574021101 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.574054003 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.574112892 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.575623035 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.575634956 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.575999022 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.576039076 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.576209068 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.576309919 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.576325893 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.579740047 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.579927921 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.580015898 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.580064058 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.580081940 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.580092907 CET49778443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.580099106 CET4434977813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.582087040 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.582123995 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.582250118 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.582428932 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.582444906 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.679183960 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.679255962 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.679336071 CET49781443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.679462910 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.679604053 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.679789066 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.680175066 CET49781443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.680195093 CET4434978113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.680285931 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.680325985 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.680355072 CET49780443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.680370092 CET4434978013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.688695908 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.688787937 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.688924074 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.689434052 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.689469099 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.689568996 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.689620018 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:23.689726114 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.690011024 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:23.690027952 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.216411114 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.217103004 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.217189074 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.217633963 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.217648983 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.221112013 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.221823931 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.221846104 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.222268105 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.222280025 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.224173069 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.224879026 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.224904060 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.225263119 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.225270033 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.317634106 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.317794085 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.317951918 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.318075895 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.318106890 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.318111897 CET49782443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.318121910 CET4434978213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.320962906 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.321058035 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.321291924 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.321501017 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.321537971 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.321602106 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.321682930 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.321736097 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.321882010 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.321913004 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.321933985 CET49784443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.321939945 CET4434978413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.326783895 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.326875925 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.327022076 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.327271938 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.327301979 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.345614910 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.345704079 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.345762014 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.345937014 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.345952034 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.345963001 CET49783443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.345968962 CET4434978313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.346318960 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.347556114 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.347604990 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.348087072 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.348100901 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.350125074 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.350214958 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.350334883 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.350562096 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.350598097 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.364878893 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.367937088 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.367961884 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.368402004 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.368412018 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.449400902 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.449543953 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.449615002 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.449738026 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.449784040 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.449815989 CET49785443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.449831009 CET4434978513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.453830004 CET49790443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.453888893 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.453993082 CET49790443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.454178095 CET49790443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.454196930 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.476633072 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.476716995 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.476766109 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.477200985 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.477219105 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.477252960 CET49786443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.477257967 CET4434978613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.481129885 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.481215954 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:24.481308937 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.481575966 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:24.481627941 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.139761925 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.140328884 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.140425920 CET49790443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.140497923 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.140675068 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.140738964 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.140779972 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.141056061 CET49790443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.141071081 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.141159058 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.141166925 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.141385078 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.141423941 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.141725063 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.141747952 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.144526005 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.144891024 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.144901037 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.145337105 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.145343065 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.147088051 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.147412062 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.147440910 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.147780895 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.147793055 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.242975950 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.243053913 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.243329048 CET49790443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.243763924 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.243912935 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.243976116 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.246184111 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.246326923 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.246386051 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.247420073 CET49790443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.247462034 CET4434979013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.249766111 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.249825954 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.249859095 CET49787443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.249876976 CET4434978713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.253272057 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.253424883 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.253552914 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.256167889 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.256247044 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.256347895 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.257136106 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.257136106 CET49788443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.257157087 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.257177114 CET4434978813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.258692026 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.258717060 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.258730888 CET49789443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.258739948 CET4434978913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.264014959 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.264023066 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.264038086 CET49791443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.264043093 CET4434979113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.291389942 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.291435003 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.291565895 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.292648077 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.292700052 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.292764902 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.298235893 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.298247099 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.298295975 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.300448895 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.300491095 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.300544977 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.301744938 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.301762104 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.301879883 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.301894903 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.302177906 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.302194118 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.306267023 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.306334972 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.306416988 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.306529045 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.306540012 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.307089090 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.307113886 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.946906090 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.947124958 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.958518028 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.963807106 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.966828108 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.966893911 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.967528105 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.967542887 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.967853069 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.967888117 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.968266010 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.968271971 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.968627930 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.968699932 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.969055891 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.969069958 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.969980001 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.970431089 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.970458031 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.970824957 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.970835924 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.971415997 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.971431017 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:25.971966982 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:25.971971989 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.064275980 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.064306974 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.064378023 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.064409018 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.064699888 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.064742088 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.065284014 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.065305948 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.065359116 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.065362930 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.065571070 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.066304922 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.066382885 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.066526890 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.066956043 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.066982031 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.066997051 CET49792443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.067003012 CET4434979213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.068744898 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.068769932 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.068800926 CET49796443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.068808079 CET4434979613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.071006060 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.071036100 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.071053982 CET49793443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.071062088 CET4434979313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.073124886 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.073203087 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.073260069 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.075751066 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.075757027 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.075769901 CET49794443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.075773001 CET4434979413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.076663017 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.076683998 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.076728106 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.076751947 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.076781988 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.078738928 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.078787088 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.078849077 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.079816103 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.079839945 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.080866098 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.090647936 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.090665102 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.090771914 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.090796947 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.090802908 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.090821981 CET49795443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.090830088 CET4434979513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.091475964 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.091490984 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.092641115 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.092653036 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.092945099 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.092961073 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.109651089 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.109692097 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.109944105 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.114999056 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.115030050 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.161475897 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.161513090 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.161725998 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.194159985 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.194180965 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.740878105 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.741038084 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.741921902 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.741986036 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.742516041 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.742536068 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.742957115 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.742985964 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.743598938 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.743608952 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.756124973 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.757356882 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.757388115 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.758245945 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.758253098 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.760857105 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.761651039 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.761672020 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.762145996 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.762151003 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.841219902 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.841506958 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.841566086 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.841641903 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.841685057 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.841711998 CET49797443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.841727972 CET4434979713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.842008114 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.842278004 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.842338085 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.844115019 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.844115019 CET49799443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.844134092 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.844155073 CET4434979913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.847278118 CET49802443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.847317934 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.847839117 CET49802443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.848649025 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.848684072 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.848757029 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.848968029 CET49802443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.848982096 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.849252939 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.849266052 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.850565910 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.850977898 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.850994110 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.851361036 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.851366043 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.856216908 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.856270075 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.856333971 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.856364012 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.856448889 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.856491089 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.856517076 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.856517076 CET49798443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.856533051 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.856544018 CET4434979813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.858977079 CET49804443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.859020948 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.859081030 CET49804443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.859178066 CET49804443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.859194040 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.861474037 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.861754894 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.861812115 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.861902952 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.861912012 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.861922026 CET49800443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.861924887 CET4434980013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.863814116 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.863843918 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.863903999 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.864176989 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.864190102 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.952351093 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.952451944 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.952584982 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.952802896 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.952802896 CET49801443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.952824116 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.952833891 CET4434980113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.959021091 CET49806443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.959121943 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:26.959338903 CET49806443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.959573984 CET49806443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:26.959618092 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.500735044 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.501450062 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.501724005 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.501744986 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.502285957 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.502293110 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.502790928 CET49804443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.502826929 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.503212929 CET49804443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.503220081 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.515038967 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.515408039 CET49802443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.515439987 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.515939951 CET49802443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.515944958 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.544835091 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.545262098 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.545278072 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.545737982 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.545742989 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.600553989 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.600833893 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.600907087 CET49804443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.601126909 CET49804443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.601150990 CET4434980413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.601535082 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.602129936 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.602185011 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.603049040 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.603080034 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.603091955 CET49803443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.603097916 CET4434980313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.607192993 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.607232094 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.607301950 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.607666016 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.607680082 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.609047890 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.609078884 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.609471083 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.610662937 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.610677958 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.617698908 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.617904902 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.617966890 CET49802443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.618048906 CET49802443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.618062973 CET4434980213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.620459080 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.620480061 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.620661974 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.620786905 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.620799065 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.635797977 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.636245012 CET49806443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.636293888 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.636763096 CET49806443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.636775970 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.649889946 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.650044918 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.650146008 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.650300026 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.650316954 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.650326014 CET49805443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.650331020 CET4434980513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.653853893 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.653879881 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.653966904 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.654211998 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.654227018 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.740735054 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.741342068 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.741417885 CET49806443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.741497993 CET49806443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.741537094 CET4434980613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.745696068 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.745739937 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:27.745822906 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.746016979 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:27.746031046 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.372997999 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.373745918 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.381778002 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.382548094 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.392663002 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.392677069 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.393188000 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.393193007 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.393704891 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.393727064 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.394213915 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.394220114 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.394503117 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.394517899 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.394922972 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.394933939 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.395606041 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.395617962 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.396116018 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.396120071 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.409219980 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.409643888 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.409661055 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.410165071 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.410168886 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.489736080 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.489897013 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.490127087 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.490497112 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.490524054 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.490540981 CET49809443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.490547895 CET4434980913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.494832039 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.494869947 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.494982004 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.495452881 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.495455027 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.495467901 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.495804071 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.495923042 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.495984077 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.496026039 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.496033907 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.496056080 CET49807443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.496062040 CET4434980713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.496371984 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.496504068 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.496587038 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.496644974 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.496665001 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.496696949 CET49810443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.496704102 CET4434981013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.496932030 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.497546911 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.497594118 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.497651100 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.499686003 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.499766111 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.499919891 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.500143051 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.500178099 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.500267982 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.500281096 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.500368118 CET49808443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.500375986 CET4434980813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.504869938 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.504897118 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.504988909 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.505141020 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.505156994 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.506036043 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.506063938 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.506162882 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.506660938 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.506686926 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.530131102 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.530210018 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.530479908 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.530644894 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.530663967 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.530675888 CET49811443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.530683994 CET4434981113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.540996075 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.541080952 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:28.541245937 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.541760921 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:28.541796923 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.144530058 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.145833969 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.145848989 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.145934105 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.146487951 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.146492958 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.149961948 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.150456905 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.150485039 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.150891066 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.150897026 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.152353048 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.152360916 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.152734041 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.152739048 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.163126945 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.163713932 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.163723946 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.164695024 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.164702892 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.192513943 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.220037937 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.220119953 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.220566988 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.220582008 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.246859074 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.246958017 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.247061014 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.247288942 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.247303963 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.247319937 CET49812443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.247325897 CET4434981213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.248579979 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.248903990 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.248963118 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.249078035 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.249082088 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.249090910 CET49814443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.249094009 CET4434981413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.252145052 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.252350092 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.252746105 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.253248930 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.253292084 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.253397942 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.253421068 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.253443003 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.253470898 CET49813443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.253485918 CET4434981313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.253832102 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.253845930 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.257509947 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.257545948 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.257621050 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.258234978 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.258249998 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.259064913 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.259077072 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.259208918 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.259501934 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.259511948 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.264009953 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.264180899 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.264230013 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.264241934 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.264288902 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.264364004 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.264394045 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.264400005 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.264411926 CET49815443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.264415979 CET4434981513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.266859055 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.266904116 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.266969919 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.267168999 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.267189026 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.319367886 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.319598913 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.319664001 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.319761038 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.319797039 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.319827080 CET49816443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.319842100 CET4434981613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.323085070 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.323148012 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.323242903 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.323472977 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.323491096 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.948952913 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.949739933 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.949781895 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.950234890 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.950241089 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.965428114 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.966130972 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.966162920 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.966873884 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.966880083 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.976105928 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.976666927 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.976752996 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.977132082 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.977149010 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.989116907 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.989592075 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.989608049 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:29.990196943 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:29.990200996 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.007987976 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.008486986 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.008543968 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.008984089 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.008997917 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.070147991 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.070322990 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.070674896 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.079139948 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.079543114 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.079624891 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.079698086 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.079708099 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.080012083 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.080080032 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.080137014 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.095324993 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.095349073 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.095366955 CET49817443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.095372915 CET4434981713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.097393990 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.097825050 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.097893953 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.099323034 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.099390984 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.099580050 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.099726915 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.099746943 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.099792957 CET49820443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.099802971 CET4434982013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.100673914 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.100698948 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.101015091 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.101047993 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.101064920 CET49818443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.101072073 CET4434981813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.103224039 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.103230000 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.103243113 CET49819443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.103245974 CET4434981913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.106858969 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.106924057 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.107062101 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.107470989 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.107501030 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.108494043 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.108529091 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.108748913 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.109554052 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.109580040 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.109667063 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.109774113 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.109786034 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.109877110 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.109891891 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.112411022 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.112626076 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.112694979 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.112756014 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.112756014 CET49821443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.112780094 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.112802029 CET4434982113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.115350008 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.115360975 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.115442991 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.115554094 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.115575075 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.744246960 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.745011091 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.745064020 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.745102882 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.745558977 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.745573044 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.745871067 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.745891094 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.746680021 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.746686935 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.751229048 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.751585960 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.751665115 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.752178907 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.752193928 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.772809982 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.773463011 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.773483038 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.774086952 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.774091005 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.790616989 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.798764944 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.798794985 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.799305916 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.799316883 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844185114 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844238997 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844322920 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844400883 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.844423056 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844460011 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844531059 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.844531059 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.844630957 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.844679117 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844712019 CET49822443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.844728947 CET4434982213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844837904 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.844856024 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.844923973 CET49824443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.844929934 CET4434982413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.848824024 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.848839998 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.849004030 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.849797964 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.849811077 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.850488901 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.850529909 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.850632906 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.850744963 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.850763083 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.853638887 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.853851080 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.853923082 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.854052067 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.854052067 CET49823443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.854110003 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.854151964 CET4434982313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.856496096 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.856542110 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.856884003 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.857027054 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.857043982 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.878526926 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.879434109 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.879501104 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.879656076 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.879671097 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.879709005 CET49826443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.879714966 CET4434982613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.882662058 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.882682085 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.882781982 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.882936954 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.882950068 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.903095961 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.903343916 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.903453112 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.903476954 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.903490067 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.903500080 CET49825443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.903506041 CET4434982513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.907025099 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.907068968 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:30.907188892 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.907344103 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:30.907360077 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.429208994 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.430191040 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.430208921 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.431092978 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.431097984 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.432394981 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.434541941 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.434561014 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.436448097 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.436460972 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.523144960 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.523689032 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.523735046 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.523768902 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.524386883 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.524399996 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.524768114 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.524782896 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.525271893 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.525276899 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.529802084 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.530262947 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.530304909 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.530312061 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.530359983 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.530538082 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.530538082 CET49827443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.530555964 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.530564070 CET4434982713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.534820080 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.534885883 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.534991026 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.535398006 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.535414934 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.535485983 CET49828443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.535492897 CET4434982813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.536679983 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.536732912 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.536796093 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.537993908 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.538019896 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.539841890 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.539875984 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.539978981 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.540739059 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.540755033 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.559632063 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.560107946 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.560152054 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.560637951 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.560646057 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.624198914 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.624963045 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.625040054 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.625315905 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.625341892 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.625358105 CET49829443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.625365973 CET4434982913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.626594067 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.626657963 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.626722097 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.627645969 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.627667904 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.627681971 CET49830443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.627688885 CET4434983013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.630827904 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.630875111 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.630930901 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.631437063 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.631464005 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.637586117 CET49835443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.637619019 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.637686014 CET49835443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.638160944 CET49835443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.638180971 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.664832115 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.664954901 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.668684006 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.671197891 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.671220064 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.671240091 CET49831443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.671247005 CET4434983113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.684148073 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.684240103 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:31.684314966 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.684583902 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:31.684622049 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.262356997 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.264975071 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.268347025 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.288784027 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.320508003 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.320648909 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.326272964 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.359338999 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.359338999 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.464368105 CET49835443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.464400053 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.465116024 CET49835443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.465126038 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.465734959 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.465768099 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.466895103 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.466905117 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.468338966 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.468353987 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.468772888 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.468779087 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.566943884 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.567724943 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.567781925 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.568928957 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.569742918 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.569797039 CET49835443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.586431980 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.586473942 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.587165117 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.587177992 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.587460041 CET49835443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.587481022 CET4434983513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.588311911 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.588344097 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.589171886 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.589179993 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.600897074 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.601269960 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.601327896 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.601453066 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.601473093 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.601489067 CET49834443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.601496935 CET4434983413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.690646887 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.690681934 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.690699100 CET49833443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.690706015 CET4434983313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.693430901 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.693511009 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.693573952 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.693620920 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.693658113 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.693713903 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.694463015 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.694493055 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.694550991 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.694552898 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.695327997 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.695497990 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.695548058 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.695652008 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.777745962 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.777789116 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.779498100 CET49836443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.779536009 CET4434983613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.782051086 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.782072067 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.782083988 CET49832443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.782089949 CET4434983213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.794898987 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.794934988 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.795073032 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.795290947 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.795308113 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.796418905 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.796448946 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.796674967 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.800838947 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.800864935 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.800956964 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.801062107 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.801073074 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.801971912 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.801983118 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.804063082 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.804085970 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:32.804151058 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.804296017 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:32.804310083 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.417435884 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.418535948 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.418622971 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.419368982 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.419382095 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.437576056 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.438308001 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.438369989 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.439013958 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.439028978 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.460203886 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.460692883 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.460721970 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.461371899 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.461384058 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.471136093 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.471530914 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.471556902 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.472305059 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.472359896 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.474565983 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.474841118 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.474877119 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.475457907 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.475466967 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.518943071 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.519222021 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.519280910 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.531054974 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.531095028 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.531112909 CET49837443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.531121969 CET4434983713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.536335945 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.536392927 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.536451101 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.546148062 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.546875954 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.546957016 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.550074100 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.550102949 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.550599098 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.550599098 CET49838443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.550638914 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.550664902 CET4434983813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.554945946 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.555033922 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.555120945 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.555246115 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.555282116 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.562834024 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.562992096 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.563038111 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.563051939 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.563101053 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.563143015 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.566833019 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.566848040 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.566860914 CET49840443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.566865921 CET4434984013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.570812941 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.570858002 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.570928097 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.571085930 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.571110964 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.579052925 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.579140902 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.579247952 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.579344988 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.579344988 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.580168962 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.580229044 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.580271006 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.580393076 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.580415010 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.580430984 CET49841443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.580437899 CET4434984113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.586111069 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.586111069 CET49839443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.586153030 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.586180925 CET4434983913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.592799902 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.592844009 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.592911959 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.594880104 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.594911098 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.596472025 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.596498013 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:33.596575975 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.596716881 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:33.596743107 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.207623959 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.211813927 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.218827963 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.218864918 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.218902111 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.219969034 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.219974995 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.220702887 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.220704079 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.220769882 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.220815897 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.221757889 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.221851110 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.221988916 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.222002029 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.252804995 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.253290892 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.253330946 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.253772974 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.253784895 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.261154890 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.261656046 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.261687040 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.262064934 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.262073040 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.316745043 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.318923950 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.318983078 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.319051981 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.319830894 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.319991112 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.320177078 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.320290089 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.320385933 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.320429087 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.320467949 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.320741892 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.320749044 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.320769072 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.320794106 CET49843443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.320801973 CET4434984313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.322395086 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.322395086 CET49844443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.322432041 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.322457075 CET4434984413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.323714018 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.323745966 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.323784113 CET49845443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.323798895 CET4434984513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.326767921 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.326798916 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.326884031 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.328473091 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.328485966 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.328494072 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.328526020 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.328648090 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.328881979 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.328898907 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.330624104 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.330634117 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.331202030 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.333901882 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.333910942 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.351712942 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.351928949 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.352010965 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.355361938 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.355361938 CET49846443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.355380058 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.355401993 CET4434984613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.359349012 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.359364033 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.359663010 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.359832048 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.359847069 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.363917112 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.364048004 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.367023945 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.367086887 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.367086887 CET49847443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.367105007 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.367125988 CET4434984713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.371239901 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.371279955 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.371432066 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.371542931 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.371556044 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.901782990 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.947204113 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.947227001 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.947503090 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.947516918 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.967084885 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.968044043 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.968044996 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.968067884 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.968084097 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.971247911 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.975471973 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.975480080 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:34.975773096 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:34.975776911 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.002242088 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.006217957 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.044711113 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.045547962 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.045614958 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.046062946 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.068500996 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.068628073 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.069137096 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.069782972 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.069806099 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.070447922 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.070463896 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.070483923 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.070489883 CET49848443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.070489883 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.070496082 CET4434984813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.071897984 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.071897984 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.071922064 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.071940899 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.071971893 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.072062016 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.072208881 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.072208881 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.072225094 CET49850443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.072228909 CET4434985013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.077825069 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.077826023 CET49849443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.077850103 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.077860117 CET4434984913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.166595936 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.166717052 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.166843891 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.166865110 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.166917086 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.166959047 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.167222023 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.167367935 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.471913099 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.471944094 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.471957922 CET49851443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.471963882 CET4434985113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.472275019 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.472275019 CET49852443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.472321033 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.472332954 CET4434985213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.644412994 CET49853443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.644449949 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.644520998 CET49853443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.684429884 CET49853443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.684458017 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.686266899 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.686331034 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.686388016 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.686609983 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.686624050 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.686979055 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.687011003 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.687061071 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.724375010 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.724431038 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.724509001 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.724632025 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.724646091 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.725549936 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.725591898 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.725641966 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.725771904 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.725797892 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:35.726583958 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:35.726597071 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.347245932 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.347824097 CET49853443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.347853899 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.348388910 CET49853443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.348397017 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.362020969 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.362925053 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.362955093 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.363394022 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.363401890 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.366477966 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.368467093 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.368494987 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.368891001 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.368900061 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.372975111 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.373291969 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.373311996 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.373351097 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.373915911 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.373927116 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.409625053 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.409656048 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.410460949 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.410471916 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.458674908 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.458767891 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.458844900 CET49853443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.459117889 CET49853443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.459139109 CET4434985313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.461996078 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.462023020 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.462069988 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.462110043 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.462141991 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.462753057 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.462775946 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.462790966 CET49857443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.462798119 CET4434985713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.465719938 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.465823889 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.465883970 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.467140913 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.467175961 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.467590094 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.468367100 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.468410015 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.468477964 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.469471931 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.469490051 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.469505072 CET49855443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.469511032 CET4434985513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.469923973 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.469942093 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.470084906 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.470101118 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.472641945 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.472671986 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.472731113 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.472882032 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.472898006 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.474335909 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.474698067 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.474740982 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.474754095 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.474797964 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.474942923 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.474952936 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.474986076 CET49856443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.474991083 CET4434985613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.477972031 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.478003979 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.478102922 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.478338003 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.478349924 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.512219906 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.512545109 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.512610912 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.513510942 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.513537884 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.513561964 CET49854443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.513570070 CET4434985413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.519686937 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.519733906 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:36.519792080 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.520225048 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:36.520241022 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.121653080 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.122164011 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.122186899 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.122663021 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.122668028 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.124111891 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.124782085 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.124802113 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.125339985 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.125349998 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.129221916 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.129606009 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.129645109 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.130280972 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.130287886 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.142556906 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.143323898 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.143345118 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.143862009 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.143867970 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.197814941 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.198364973 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.198379993 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.198837042 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.198842049 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.221822023 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.222249985 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.222311020 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.222337961 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.222352982 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.222378969 CET49858443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.222384930 CET4434985813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.225159883 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.225207090 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.225353956 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.225553989 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.225569010 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.227158070 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.227915049 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.227977037 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.229892969 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.229903936 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.229914904 CET49860443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.229919910 CET4434986013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.232358932 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.232456923 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.232537985 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.232717991 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.232765913 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.234791994 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.235021114 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.235105038 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.235160112 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.235179901 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.235193968 CET49859443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.235203028 CET4434985913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.237193108 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.237279892 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.237720013 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.237823009 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.237852097 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.246140957 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.248430014 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.248498917 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.248732090 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.248740911 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.248750925 CET49861443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.248755932 CET4434986113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.251077890 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.251133919 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.251259089 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.251749992 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.251790047 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.302752018 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.303035021 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.303103924 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.303148985 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.303169012 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.303185940 CET49862443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.303191900 CET4434986213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.306231022 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.306263924 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.306469917 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.306632042 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.306647062 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.876185894 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.880923986 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.880959988 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.881400108 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.881407022 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.881865978 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.882205009 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.882230043 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.882632971 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.882638931 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.888930082 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.889343977 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.889386892 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.889719963 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.889736891 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.924200058 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.924714088 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.924758911 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.925179005 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.925184965 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.972884893 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.978957891 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.979418993 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.979449987 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.979907036 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.979919910 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.982615948 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.982702017 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.982733965 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.982752085 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.982791901 CET49864443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.982799053 CET4434986413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.984934092 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.985007048 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.985503912 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.985527992 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.985549927 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.985646963 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.985666037 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.985682011 CET49863443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.985687971 CET4434986313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.985719919 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.986905098 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.986920118 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.988074064 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.988168001 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.988630056 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.988955021 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.988989115 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.992247105 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.992394924 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.992470980 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.992549896 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.992602110 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.992602110 CET49865443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.992633104 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.992657900 CET4434986513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.994899035 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.994913101 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:37.995167971 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.995266914 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:37.995277882 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.030374050 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.030477047 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.030570984 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.030827999 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.030839920 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.030852079 CET49866443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.030858040 CET4434986613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.033390999 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.033483028 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.033576965 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.033802986 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.033837080 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.080281019 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.080621958 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.080687046 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.081135035 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.081135035 CET49867443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.081156969 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.081177950 CET4434986713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.083781958 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.083828926 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.083926916 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.084261894 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.084290028 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.638382912 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.639168978 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.639204025 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.640106916 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.640117884 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.664402962 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.666347980 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.666382074 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.666963100 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.666974068 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.669226885 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.669615030 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.669653893 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.670015097 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.670022964 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.736581087 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.737181902 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.737267971 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.737684011 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.737699986 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.746063948 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.746094942 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.746139050 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.746141911 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.746184111 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.746380091 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.746400118 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.746412992 CET49870443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.746418953 CET4434987013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.750025988 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.750119925 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.750196934 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.750752926 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.750796080 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.772269964 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.772341013 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.772406101 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.772442102 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.772504091 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.772548914 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.772593975 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.772623062 CET49871443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.772639990 CET4434987113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.776781082 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.776843071 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.776910067 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.777086020 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.777113914 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.783260107 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.783360958 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.783412933 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.783685923 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.783706903 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.783720016 CET49868443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.783726931 CET4434986813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.829957008 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.830003023 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.830073118 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.830343962 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.830362082 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.840727091 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.840981007 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.841063023 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.841108084 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.841108084 CET49872443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.841130018 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.841140985 CET4434987213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.844132900 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.844165087 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:38.844214916 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.844605923 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:38.844638109 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.386054993 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.386965990 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.387007952 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.387505054 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.387514114 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.441688061 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.442364931 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.442393064 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.443162918 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.443171024 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.489106894 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.489375114 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.489500999 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.489547968 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.489619970 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.497363091 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.497396946 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.497821093 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.497834921 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.498382092 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.498382092 CET49873443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.498420000 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.498446941 CET4434987313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.501737118 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.501787901 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.501868010 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.502074003 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.502115011 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.520567894 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.521164894 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.521239996 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.521639109 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.521652937 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.546889067 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.546993017 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.547092915 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.547466040 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.547508001 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.547538042 CET49874443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.547554016 CET4434987413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.550343990 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.550384045 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.550465107 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.550616980 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.550631046 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.594376087 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.594429016 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.594511986 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.594542027 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.594671011 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.594733953 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.595340967 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.595340967 CET49875443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.595366955 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.595391035 CET4434987513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.600419044 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.600517988 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.600600004 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.600739002 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.600776911 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.627430916 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.627557039 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.627609968 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.627636909 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.627665997 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.627840042 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.627860069 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.627892971 CET49876443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.627897978 CET4434987613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.629921913 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.629967928 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:39.630033970 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.630140066 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:39.630155087 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.000097990 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.001403093 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.001455069 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.001899958 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.001914024 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.110599995 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.110622883 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.110703945 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.110712051 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.110785007 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.112725019 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.112725019 CET49869443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.112771988 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.112799883 CET4434986913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.115758896 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.115820885 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.115931034 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.116091967 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.116111040 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.178287983 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.183928013 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.184014082 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.184391975 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.184406996 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.198941946 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.201329947 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.201358080 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.201783895 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.201793909 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.276204109 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.276851892 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.276881933 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.277312994 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.277319908 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.281830072 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.282150984 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.282211065 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.282485008 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.282497883 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.284557104 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.284904957 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.284951925 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.284961939 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.285011053 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.285058975 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.285059929 CET49877443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.285094023 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.285116911 CET4434987713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.287709951 CET49882443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.287755013 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.287827969 CET49882443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.288077116 CET49882443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.288091898 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.298607111 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.298757076 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.298815012 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.298849106 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.298866987 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.298878908 CET49878443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.298883915 CET4434987813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.301044941 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.301081896 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.301136017 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.301229954 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.301244974 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.376636028 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.376796961 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.376859903 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.377055883 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.377082109 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.377098083 CET49880443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.377103090 CET4434988013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.381611109 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.381656885 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.381714106 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.382442951 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.382457018 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.388715982 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.388812065 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.388860941 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.389086008 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.389110088 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.389126062 CET49879443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.389134884 CET4434987913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.392623901 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.392652035 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.392702103 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.393687963 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.393702030 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.780682087 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.783432961 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.783452034 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.784070969 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.784076929 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.886992931 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.887026072 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.887070894 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.887151003 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.887202978 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.888151884 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.888174057 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.888185024 CET49881443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.888190985 CET4434988113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.891917944 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.891968966 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.892038107 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.892359018 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.892369986 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.936538935 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.937273979 CET49882443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.937303066 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.937824965 CET49882443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.937829971 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.967180967 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.967721939 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.967745066 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:40.968174934 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:40.968182087 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.032300949 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.032883883 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.032912970 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.033390045 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.033396959 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.049062967 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.049356937 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.049417019 CET49882443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.049978018 CET49882443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.049992085 CET4434988213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.053522110 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.053564072 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.053641081 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.053757906 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.053772926 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.056691885 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.056992054 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.057001114 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.057421923 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.057425022 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.074634075 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.074918985 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.074961901 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.074984074 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.075140953 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.075140953 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.075140953 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.077450037 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.077497959 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.077567101 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.077687025 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.077702999 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.133825064 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.133982897 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.134165049 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.134246111 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.134272099 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.134285927 CET49884443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.134294033 CET4434988413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.137188911 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.137237072 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.137327909 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.137459993 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.137479067 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.218280077 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.218322039 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.218385935 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.218388081 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.218444109 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.218786955 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.218808889 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.218818903 CET49885443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.218826056 CET4434988513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.222073078 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.222119093 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.222222090 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.222362995 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.222378016 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.544466019 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.550383091 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.550415039 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.550888062 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.550894022 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.562486887 CET49883443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.562521935 CET4434988313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.687009096 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.687258959 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.687441111 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.687835932 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.687860966 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.687876940 CET49886443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.687885046 CET4434988613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.691551924 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.691606998 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.691690922 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.692003965 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.692015886 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.696213961 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.699340105 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.699368954 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.699866056 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.699872971 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.729510069 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.731302023 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.731332064 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.731750965 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.731756926 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.795886040 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.796196938 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.796334028 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.796597958 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.796618938 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.796631098 CET49887443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.796637058 CET4434988713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.801815987 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.802054882 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.802103043 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.802397013 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.802423954 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.802437067 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.802840948 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.802848101 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.802966118 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.802988052 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.830936909 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.831432104 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.835011959 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.835042953 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.835063934 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.835077047 CET49888443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.835082054 CET4434988813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.837883949 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.837996006 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.839284897 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.839417934 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.839456081 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.885150909 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.907223940 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.907527924 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.907877922 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.913477898 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.913496971 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.913983107 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.913990021 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.915462017 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.915488958 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.915563107 CET49889443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.915570021 CET4434988913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.926740885 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.926780939 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:41.926891088 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.927061081 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:41.927074909 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.013844967 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.014080048 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.014134884 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.014424086 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.014447927 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.014458895 CET49890443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.014465094 CET4434989013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.021975994 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.022051096 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.022180080 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.022537947 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.022563934 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.334378958 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.334995985 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.335074902 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.335566998 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.335582018 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.434528112 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.435252905 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.435278893 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.435772896 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.435777903 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.439327002 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.439369917 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.439416885 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.439434052 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.439501047 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.439678907 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.439727068 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.439755917 CET49891443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.439771891 CET4434989113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.443290949 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.443345070 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.443414927 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.443545103 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.443562031 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.474945068 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.475460052 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.475545883 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.475903988 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.475918055 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.534780979 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.534862041 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.534919024 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.535240889 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.535257101 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.535296917 CET49892443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.535301924 CET4434989213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.538526058 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.538562059 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.538635969 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.538762093 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.538777113 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.574345112 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.574803114 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.574846983 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.574883938 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.574951887 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.594290972 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.594312906 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.594324112 CET49893443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.594330072 CET4434989313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.597461939 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.597513914 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.597584009 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.597747087 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.597763062 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.598615885 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.598962069 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.598989010 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.599440098 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.599450111 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.657130957 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.657635927 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.657659054 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.658102989 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.658107996 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.702065945 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.702299118 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.702492952 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.702912092 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.702949047 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.702999115 CET49894443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.703021049 CET4434989413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.707633972 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.707684994 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.707746983 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.707896948 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.707910061 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.757066965 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.757105112 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.757150888 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.757245064 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.757424116 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.757424116 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.758970976 CET49895443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.759011984 CET4434989513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.760143995 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.760180950 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:42.760256052 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.760626078 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:42.760636091 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.004816055 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.007555962 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.007586956 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.008024931 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.008034945 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.107768059 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.108052015 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.108155966 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.108155966 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.109316111 CET49896443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.109332085 CET4434989613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.111665964 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.111696959 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.111752033 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.111943007 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.111958027 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.178890944 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.181955099 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.181972027 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.182446003 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.182451010 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.259488106 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.278862000 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.278894901 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.279345989 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.279355049 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.284603119 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.284645081 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.284689903 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.284701109 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.284744024 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.284837961 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.284862995 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.284878016 CET49897443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.284884930 CET4434989713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.287708998 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.287753105 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.287822008 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.287962914 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.287972927 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.378067017 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.378950119 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.378978968 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.379945993 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.379951000 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.383076906 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.383141041 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.383197069 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.383389950 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.383409977 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.383423090 CET49898443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.383429050 CET4434989813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.388081074 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.388120890 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.388179064 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.388417959 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.388436079 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.396287918 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.396855116 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.396882057 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.397310019 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.397315979 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.481559992 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.481618881 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.481699944 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.481717110 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.481827974 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.481883049 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.482017040 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.482033968 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.482043028 CET49899443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.482049942 CET4434989913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.485095978 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.485124111 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.485188007 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.485328913 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.485337973 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.495997906 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.496032000 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.496088028 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.496119976 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.496362925 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.496416092 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.496416092 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.496439934 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.496454000 CET49900443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.496459961 CET4434990013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.498944044 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.498996973 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.499068975 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.499191999 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.499205112 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.775110960 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.775710106 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.775731087 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.776223898 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.776233912 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.876105070 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.876163006 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.876250982 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.876276016 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.876332998 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.883534908 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.883554935 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.883567095 CET49901443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.883573055 CET4434990113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.886600018 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.886653900 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.886730909 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.886876106 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.886890888 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.926793098 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.927499056 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.927520037 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:43.928016901 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:43.928021908 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.026242018 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.026612043 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.026684046 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.028239012 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.028261900 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.028276920 CET49902443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.028283119 CET4434990213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.031176090 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.031223059 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.031301022 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.031543016 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.031553984 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.038898945 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.039525032 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.039546967 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.040033102 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.040039062 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.133003950 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.133718014 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.133747101 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.134241104 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.134248972 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.137156010 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.137811899 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.137831926 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.138312101 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.138317108 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.184099913 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.184129953 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.184174061 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.184251070 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.184288025 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.184500933 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.184525013 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.184536934 CET49903443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.184542894 CET4434990313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.187764883 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.187788963 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.187875986 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.188153028 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.188168049 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.232307911 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.232398987 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.232450962 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.232544899 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.232595921 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.232901096 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.232923031 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.232935905 CET49905443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.232942104 CET4434990513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.236109972 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.236160040 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.236231089 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.236407042 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.236417055 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.240819931 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.240963936 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.241008997 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.241061926 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.241080999 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.241092920 CET49904443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.241099119 CET4434990413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.243274927 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.243319988 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.243391991 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.243506908 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.243520021 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.574112892 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.574820995 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.574845076 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.575301886 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.575306892 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.680098057 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.680171013 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.680335999 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.680538893 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.680557966 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.680571079 CET49906443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.680577040 CET4434990613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.683758974 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.683805943 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.683881998 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.684043884 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.684055090 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.695307970 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.695854902 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.695890903 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.696356058 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.696363926 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.798183918 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.798367977 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.798429966 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.798528910 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.798528910 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.798624992 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.798645020 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.798660994 CET49907443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.798666954 CET4434990713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.801790953 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.801839113 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.801906109 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.802052975 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.802063942 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.841690063 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.842442036 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.842475891 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.842812061 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.842818022 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.875977039 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.876328945 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.876674891 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.876696110 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.877036095 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.877042055 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.877552986 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.877582073 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.877934933 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.877939939 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.942564964 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.942753077 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.942801952 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.943943024 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.943963051 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.943974018 CET49908443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.943979979 CET4434990813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.951956987 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.952001095 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.952054024 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.952343941 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.952352047 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.976742983 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.977098942 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.977152109 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.977601051 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.977834940 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.977880001 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.977885962 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.977931023 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.997302055 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.997337103 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:44.997351885 CET49910443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:44.997359037 CET4434991013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.000816107 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.000835896 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.000849009 CET49909443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.000854969 CET4434990913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.005422115 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.005464077 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.005521059 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.006607056 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.006644964 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.006710052 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.006802082 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.006814003 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.006911039 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.006922960 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.334429979 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.342616081 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.342636108 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.343374014 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.343379021 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.442761898 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.442836046 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.442887068 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.443108082 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.443121910 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.443133116 CET49911443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.443140030 CET4434991113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.446038008 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.446084976 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.446172953 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.446310043 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.446331024 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.483362913 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.484065056 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.484086037 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.484704971 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.484709978 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.594472885 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.594532013 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.594584942 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.594624996 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.594651937 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.594872952 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.594891071 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.594903946 CET49912443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.594911098 CET4434991213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.597857952 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.597903967 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.597979069 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.598124027 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.598136902 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.620937109 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.621543884 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.621570110 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.622039080 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.622042894 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.647293091 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.647876024 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.647896051 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.648367882 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.648372889 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.652570009 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.652838945 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.652858019 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.653176069 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.653182030 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.724455118 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.724945068 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.725045919 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.725090027 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.725111961 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.725126028 CET49913443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.725131035 CET4434991313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.728105068 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.728166103 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.728374004 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.728548050 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.728564978 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.753894091 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.753978968 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.754062891 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.754092932 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.754117966 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.754184008 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.754319906 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.754333973 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.754344940 CET49915443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.754349947 CET4434991513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.757178068 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.757221937 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.757304907 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.757441998 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.757457972 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.758754969 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.758821011 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.758912086 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.758948088 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.758968115 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.758981943 CET49914443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.758986950 CET4434991413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.760786057 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.760821104 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:45.760888100 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.761003017 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:45.761018991 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.091012955 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.094820976 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.094839096 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.095441103 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.095448971 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.197865963 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.197973967 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.198030949 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.198554039 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.198554039 CET49916443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.198574066 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.198581934 CET4434991613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.201966047 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.202014923 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.202080965 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.202393055 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.202404022 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.240710974 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.241291046 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.241314888 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.241908073 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.241914034 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.346309900 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.346508026 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.346553087 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.346555948 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.346616030 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.379076958 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.379097939 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.379113913 CET49917443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.379128933 CET4434991713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.385696888 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.385744095 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.385791063 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.386221886 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.386245966 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.397445917 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.397916079 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.397942066 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.398655891 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.398662090 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.415141106 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.415697098 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.415730953 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.416266918 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.416275024 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.417936087 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.418492079 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.418502092 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.419123888 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.419128895 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.501121044 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.501353025 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.501512051 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.501512051 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.501512051 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.504704952 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.504748106 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.504862070 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.505091906 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.505106926 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.519898891 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.519927979 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.519977093 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.520014048 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.520076990 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.520217896 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.520236969 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.520248890 CET49920443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.520256996 CET4434992013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.521271944 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.521404982 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.521449089 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.521838903 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.521848917 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.521867037 CET49919443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.521872997 CET4434991913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.524657965 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.524702072 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.524764061 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.524893999 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.524909973 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.525964022 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.525996923 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.526048899 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.526315928 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.526326895 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:46.625225067 CET4970080192.168.2.6104.18.20.226
                                                                                Nov 20, 2024 11:16:46.625232935 CET4970180192.168.2.6104.18.21.226
                                                                                Nov 20, 2024 11:16:46.625296116 CET4970280192.168.2.6104.18.21.226
                                                                                Nov 20, 2024 11:16:46.853209972 CET8049700104.18.20.226192.168.2.6
                                                                                Nov 20, 2024 11:16:46.853228092 CET8049701104.18.21.226192.168.2.6
                                                                                Nov 20, 2024 11:16:46.853238106 CET8049702104.18.21.226192.168.2.6
                                                                                Nov 20, 2024 11:16:46.853355885 CET4970080192.168.2.6104.18.20.226
                                                                                Nov 20, 2024 11:16:46.853364944 CET4970180192.168.2.6104.18.21.226
                                                                                Nov 20, 2024 11:16:46.853378057 CET4970280192.168.2.6104.18.21.226
                                                                                Nov 20, 2024 11:16:46.906279087 CET49918443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:46.906303883 CET4434991813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.041800976 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.064541101 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.064562082 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.065162897 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.065167904 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.067261934 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.068259954 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.068289995 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.068802118 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.068810940 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.153925896 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.162003040 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.162079096 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.162139893 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.172436953 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.172646999 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.172672987 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.172703028 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.172754049 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.172765970 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.173224926 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.173230886 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.173374891 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.173477888 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.173504114 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.173827887 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.173839092 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.174016953 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.174036980 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.174365044 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.174371004 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.174760103 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.174777985 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.174791098 CET49921443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.174796104 CET4434992113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.177649975 CET49926443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.177685976 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.177779913 CET49926443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.177885056 CET49926443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.177900076 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.187959909 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.187959909 CET49922443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.187987089 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.187999010 CET4434992213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.273420095 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.273657084 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.273744106 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.273771048 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.273883104 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.273973942 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.274873972 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.275068998 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.275120020 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.275154114 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.275278091 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.275327921 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.279077053 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.279247999 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.279309988 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.312906027 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.312944889 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.312962055 CET49923443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.312968969 CET4434992313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.312994003 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.313024044 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.313047886 CET49925443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.313055038 CET4434992513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.313666105 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.313690901 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.313700914 CET49924443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.313707113 CET4434992413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.357019901 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.357070923 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.357130051 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.426400900 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.426446915 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.426503897 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.426763058 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.426790953 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.445605040 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.445647001 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.445708036 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.445955992 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.445966959 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.447240114 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.447268009 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.447325945 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.447403908 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.447417021 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.448445082 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.448462009 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.809551954 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.810177088 CET49926443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.810195923 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.810689926 CET49926443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.810694933 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.909832001 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.909879923 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.910017014 CET49926443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.910451889 CET49926443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.910470009 CET4434992613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.914575100 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.914690971 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:47.914788961 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.914931059 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:47.914959908 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.068783045 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.069377899 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.069407940 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.069855928 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.069861889 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.097142935 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.104959965 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.104988098 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.105510950 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.105524063 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.115343094 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.115715027 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.115732908 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.116099119 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.116105080 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.174010992 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.174416065 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.174504042 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.174546957 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.174546957 CET49927443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.174566984 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.174577951 CET4434992713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.177462101 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.177517891 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.177664995 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.177766085 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.177779913 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.204035997 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.204063892 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.204107046 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.204153061 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.204215050 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.204341888 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.204386950 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.204415083 CET49929443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.204431057 CET4434992913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.207034111 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.207070112 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.207267046 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.207442999 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.207454920 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.222094059 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.222218990 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.222284079 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.222328901 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.222343922 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.222357988 CET49930443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.222362995 CET4434993013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.229362011 CET49934443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.229387045 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.229477882 CET49934443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.230166912 CET49934443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.230178118 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.577316999 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.577842951 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.577909946 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.578391075 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.578404903 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.684156895 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.684709072 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.684767008 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.684798956 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.684825897 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.684880018 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.684901953 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.684915066 CET49931443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.684920073 CET4434993113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.688193083 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.688230991 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.688306093 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.688951969 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.688961983 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.905009031 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.907072067 CET49934443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.907088041 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.907537937 CET49934443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.907546043 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.910444975 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.910758972 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.910768032 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.911139965 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.911153078 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.911695957 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.911932945 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.911956072 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:48.912288904 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:48.912295103 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.005215883 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.006094933 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.006198883 CET49934443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.006225109 CET49934443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.006244898 CET4434993413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.008678913 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.008848906 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.008985043 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.009273052 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.009345055 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.009352922 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.009363890 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.009371996 CET49932443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.009378910 CET4434993213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.009443045 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.009604931 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.009664059 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.011464119 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.011501074 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.011570930 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.011691093 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.011703968 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.014914036 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.014997005 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.015049934 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.015064001 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.015103102 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.015151978 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.015166998 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.015181065 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.015193939 CET49933443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.015197992 CET4434993313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.019865036 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.019898891 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.019969940 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.020070076 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.020096064 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.555507898 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.556133986 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.556164980 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.556622982 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.556627035 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.653387070 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.654051065 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.654076099 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.654527903 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.654531956 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.660259962 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.660594940 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.660629034 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.660964012 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.660972118 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.664027929 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.664294004 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.664307117 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.664633036 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.664637089 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.665349960 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.665409088 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.665513039 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.669455051 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.669455051 CET49935443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.669472933 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.669481993 CET4434993513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.678724051 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.678764105 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.678823948 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.679136992 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.679146051 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.752624035 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.752896070 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.752932072 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.752965927 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.753000021 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.753051043 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.753068924 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.753082037 CET49937443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.753087044 CET4434993713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.755963087 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.755989075 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.756067038 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.756222010 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.756231070 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.762150049 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.762231112 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.762284994 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.762491941 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.762506008 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.762530088 CET49938443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.762536049 CET4434993813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.765347004 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.765389919 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.765482903 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.765758991 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.765775919 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.775513887 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.775849104 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.775950909 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.775950909 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.775974989 CET49936443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.775983095 CET4434993613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.778167963 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.778199911 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:49.778353930 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.778476954 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:49.778491974 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.351413965 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.409662962 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.410017014 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.422137022 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.437212944 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.602062941 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.602088928 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.603086948 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.603091955 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.603697062 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.603720903 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.607134104 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.607141018 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.607409954 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.607418060 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.607796907 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.607800961 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.608072996 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.608100891 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.620431900 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.620460033 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.701374054 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.701540947 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.701598883 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.705972910 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.706053972 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.706101894 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.709907055 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.710200071 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.710258961 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.720685005 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.720839024 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.721224070 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.738791943 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.738812923 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.738830090 CET49942443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.738836050 CET4434994213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.741122007 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.741122007 CET49941443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.741156101 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.741168022 CET4434994113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.749641895 CET49939443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.749659061 CET4434993913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.751506090 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.751522064 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.751533031 CET49940443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.751537085 CET4434994013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.855262041 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.855320930 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.855431080 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.858385086 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.858432055 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.858484030 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.858997107 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.859019041 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.889591932 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.889617920 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.893058062 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.893125057 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.893184900 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.893331051 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.893348932 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.913372040 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.913484097 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:50.913573027 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.914648056 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:50.914684057 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.091376066 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.091989040 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.092020035 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.092439890 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.092446089 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.216090918 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.216170073 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.216253996 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.231767893 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.231800079 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.231832981 CET49928443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.231842041 CET4434992813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.234972000 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.235028028 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.235100985 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.261219978 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.261281013 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.506340027 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.506921053 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.506958008 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.507467031 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.507472038 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.547498941 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.549721003 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.549747944 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.550165892 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.550172091 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.556469917 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.556972027 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.557033062 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.557368040 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.557380915 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.557739019 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.560379982 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.560408115 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.560754061 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.560765982 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.607259035 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.607455969 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.607511997 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.614773035 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.614811897 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.614830971 CET49943443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.614839077 CET4434994313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.618367910 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.618405104 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.618504047 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.618675947 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.618690014 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.654126883 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.654303074 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.654402018 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.654433012 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.654463053 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.654493093 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.654519081 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.654530048 CET49945443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.654537916 CET4434994513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.658448935 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.658854961 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.658925056 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.659137964 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.659138918 CET49946443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.659179926 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.659207106 CET4434994613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.662503958 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.662544012 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.662596941 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.663038969 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.663136005 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.663151026 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.663774014 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.664223909 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.664238930 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.664257050 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.664300919 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.664433956 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.664441109 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.670329094 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.670347929 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.670371056 CET49944443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.670384884 CET4434994413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.673255920 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.673274994 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.673326969 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.673573971 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.673585892 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.907082081 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.918061972 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.918093920 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:51.918575048 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:51.918581009 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.014178991 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.014597893 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.014719009 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.014725924 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.014771938 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.014972925 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.014995098 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.015007019 CET49947443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.015012026 CET4434994713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.018472910 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.018574953 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.018711090 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.019218922 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.019264936 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.268356085 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.276689053 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.276706934 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.277174950 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.277180910 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.320755959 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.321301937 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.321326017 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.321795940 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.321803093 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.326472998 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.326824903 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.326858044 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.327224016 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.327234983 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.341461897 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.341851950 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.341893911 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.342226028 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.342243910 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.377419949 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.377516031 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.377605915 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.377904892 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.377923012 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.377933979 CET49948443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.377938986 CET4434994813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.380798101 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.380842924 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.380909920 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.381092072 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.381104946 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.422972918 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.423130989 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.423177004 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.423553944 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.423572063 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.423584938 CET49950443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.423590899 CET4434995013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.428267002 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.428302050 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.428358078 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.428721905 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.428806067 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.428822041 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.428854942 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.428899050 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.429023981 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.429042101 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.429054976 CET49951443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.429060936 CET4434995113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.432293892 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.432308912 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.432359934 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.432531118 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.432543039 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.450278044 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.450347900 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.450397015 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.450412989 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.450462103 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.450508118 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.474597931 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.474627972 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.474642038 CET49949443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.474648952 CET4434994913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.522608995 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.522663116 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.522768974 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.522924900 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.522934914 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.672365904 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.672960997 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.672996998 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.673501015 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.673506975 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.774524927 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.774775982 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.774866104 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.774947882 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.774964094 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.774974108 CET49952443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.774979115 CET4434995213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.778091908 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.778142929 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:52.778211117 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.778358936 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:52.778366089 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.032486916 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.055787086 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.055819035 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.056277990 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.056286097 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.065157890 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.065587044 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.065612078 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.066011906 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.066016912 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.080415964 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.080786943 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.080817938 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.081171036 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.081182003 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.154782057 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.154851913 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.154962063 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.154964924 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.155014992 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.174290895 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.174458027 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.174520016 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.185480118 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.185549021 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.185597897 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.192897081 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.204484940 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.204526901 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.209270000 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.209284067 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.209465981 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.209502935 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.209527016 CET49953443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.209533930 CET4434995313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.217092037 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.217129946 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.217145920 CET49954443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.217154026 CET4434995413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.225100994 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.225121021 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.225148916 CET49955443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.225152969 CET4434995513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.309705973 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.309742928 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.309809923 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.309827089 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.310050964 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.310091019 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.421034098 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.489310980 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.489345074 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.489403963 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.493699074 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.493710041 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.493741035 CET49956443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.493745089 CET4434995613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.501408100 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.599687099 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.599699020 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.600258112 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.600263119 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.601392984 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.601421118 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.604698896 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.604727030 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.604784966 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.605133057 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.605144978 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.606184959 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.606224060 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.606273890 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.606479883 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.606491089 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.697901964 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.697998047 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.698050022 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.740885019 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.740912914 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.740926027 CET49957443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.740932941 CET4434995713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.750688076 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.750739098 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.750803947 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.752336979 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.752353907 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.755001068 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.755037069 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:53.755116940 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.755352974 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:53.755363941 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.247344017 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.249485970 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.249506950 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.250099897 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.250106096 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.269793987 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.271111012 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.271627903 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.271661043 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.271744967 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.271761894 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.272068024 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.272073030 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.272170067 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.272175074 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.352843046 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.352884054 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.352950096 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.352966070 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.352988005 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.353039026 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.353260994 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.353277922 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.353287935 CET49959443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.353292942 CET4434995913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.356507063 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.356549978 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.356622934 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.356764078 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.356775045 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.378767014 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.378823042 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.378899097 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.378911018 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.378957033 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.379034042 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.379300117 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.379316092 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.379329920 CET49958443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.379333973 CET4434995813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.380520105 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.380547047 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.380620003 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.380636930 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.380765915 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.380887032 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.381062031 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.381074905 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.381083965 CET49960443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.381089926 CET4434996013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.383837938 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.383865118 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.384021997 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.384273052 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.384284973 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.388138056 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.388179064 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.388247967 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.388456106 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.388473988 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.392666101 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.393047094 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.393064976 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.393506050 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.393511057 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.411459923 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.411818981 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.411835909 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.412219048 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.412224054 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.494374037 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.494401932 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.494452953 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.494462967 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.494573116 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.494642019 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.513307095 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.513401031 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.513465881 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.518326044 CET49961443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.518342018 CET4434996113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.520060062 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.520077944 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.520091057 CET49962443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.520097017 CET4434996213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.524871111 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.524908066 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.525027037 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.525675058 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.525717974 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.525783062 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.526043892 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.526053905 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:54.526130915 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:54.526141882 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.005274057 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.030710936 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.030731916 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.031198978 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.031204939 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.048960924 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.049307108 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.049326897 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.049721956 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.049729109 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.088649035 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.093172073 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.093188047 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.093671083 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.093676090 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.130721092 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.130779982 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.130892992 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.131078959 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.131099939 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.131110907 CET49963443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.131115913 CET4434996313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.133929968 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.133959055 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.134015083 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.134150982 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.134164095 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.147933006 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.148607016 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.148684978 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.148957968 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.148958921 CET49965443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.148978949 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.148991108 CET4434996513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.151226044 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.151258945 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.151324034 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.151433945 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.151442051 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.205540895 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.209316969 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.209336996 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.209671974 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.209676981 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.212511063 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.212655067 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.212718964 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.212820053 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.212837934 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.212851048 CET49964443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.212857962 CET4434996413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.212867975 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.215079069 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.215101957 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.215378046 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.215389967 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.215410948 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.215778112 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.215781927 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.215887070 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.215895891 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.312843084 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.312874079 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.312943935 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.312954903 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.313108921 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.313149929 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.315495014 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.315511942 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.315526962 CET49967443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.315534115 CET4434996713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.318227053 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.318253994 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.318314075 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.318419933 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.318428040 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.321279049 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.321325064 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.321371078 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.321383953 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.321418047 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.321422100 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.321432114 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.321434975 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.321444035 CET49966443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.321456909 CET4434996613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.323292017 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.323324919 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.323376894 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.323470116 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.323484898 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.774867058 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.775408983 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.775425911 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.775904894 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.775911093 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.788955927 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.789390087 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.789405107 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.789844036 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.789849043 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.865658045 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.868005991 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.868019104 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.868603945 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.868608952 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.879539967 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.879607916 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.879673004 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.879681110 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.879702091 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.879848957 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.879848957 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.890662909 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.890717983 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.890789986 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.890799999 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.890978098 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.915283918 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.915283918 CET49969443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:55.915311098 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:55.915329933 CET4434996913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.066823959 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.066864014 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.066931963 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.067784071 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.067796946 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.245692015 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.245708942 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.245795012 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.245898008 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.245898008 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.246784925 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.246810913 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.246825933 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.246871948 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.246885061 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.246929884 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.254103899 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.254120111 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.255239010 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.255281925 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.255307913 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.255310059 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.255352974 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.283971071 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.283992052 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.284003019 CET49968443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.284008026 CET4434996813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.292503119 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.292503119 CET49970443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.292509079 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.292517900 CET4434997013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.300373077 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.300398111 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.304023027 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.304035902 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.304582119 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.304616928 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.306473017 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.306480885 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.400840044 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.400959969 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.401004076 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.401037931 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.401061058 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.401099920 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.401123047 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.401171923 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.401940107 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.401999950 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.402050018 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.402070999 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.402425051 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.402475119 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.414506912 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.414524078 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.414535046 CET49971443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.414540052 CET4434997113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.423583984 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.423612118 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.423640966 CET49972443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.423648119 CET4434997213.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.659383059 CET49974443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.659423113 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.659485102 CET49974443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.662034988 CET49974443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.662050009 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.663872004 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.663912058 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.663966894 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.664124966 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.664139986 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.665932894 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.666030884 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.666110039 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.666217089 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.666239977 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.666731119 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.666836023 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.666903973 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.667058945 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.667095900 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.881787062 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.882477045 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.882499933 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.882962942 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.882970095 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.986989021 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.987092972 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.987253904 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.987643957 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.987664938 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.987680912 CET49973443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.987687111 CET4434997313.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.990926027 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.990972996 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:56.991059065 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.991203070 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:56.991214037 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.315881014 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.321919918 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.323071957 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.323339939 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.323401928 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.324079990 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.324094057 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.324532032 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.324548960 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.325149059 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.325154066 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.325639009 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.325707912 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.326672077 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.329348087 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.329364061 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.329891920 CET49974443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.329902887 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.330574989 CET49974443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.330579996 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.423783064 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.423866987 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.423960924 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.424010038 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.424102068 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.424165964 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.425400972 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.425551891 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.425616026 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.433454990 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.433743954 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.433759928 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.433830023 CET49974443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.433995008 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.434067011 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.434685946 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.434685946 CET49976443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.434736967 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.434760094 CET4434997613.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.435571909 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.435605049 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.435647964 CET49977443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.435664892 CET4434997713.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.438529015 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.438544035 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.438555956 CET49975443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.438560963 CET4434997513.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.438631058 CET49974443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.438647985 CET4434997413.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.442735910 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.442822933 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.442895889 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.443341970 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.443391085 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.443445921 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.443974018 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.444000959 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.444055080 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.444165945 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.444214106 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.444232941 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.444248915 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.444339991 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.444350004 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.633203983 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.634253025 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.634277105 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.634758949 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.634763002 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.735419989 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.735560894 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.735635996 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.779841900 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.779900074 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:57.779937983 CET49978443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:57.779958010 CET4434997813.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.114933968 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.115756035 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.122922897 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.122948885 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.123426914 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.123433113 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.123667955 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.123696089 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.124031067 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.124036074 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.128386974 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.128650904 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.128693104 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.129012108 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.129018068 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.222863913 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.223382950 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.223591089 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.223606110 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.223700047 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.223720074 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.223730087 CET49981443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.223736048 CET4434998113.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.223783016 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.223851919 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.223993063 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.223993063 CET49979443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.224040031 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.224066973 CET4434997913.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.235085964 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.235251904 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.235316992 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.235467911 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.235487938 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:16:58.235500097 CET49980443192.168.2.613.107.246.45
                                                                                Nov 20, 2024 11:16:58.235506058 CET4434998013.107.246.45192.168.2.6
                                                                                Nov 20, 2024 11:17:33.849550009 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:33.860816002 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:33.860960960 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:33.887645006 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:33.895668983 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:33.903969049 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:33.911660910 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:34.356476068 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:34.356534958 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:34.356672049 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:34.360337019 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:34.367937088 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:34.472248077 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:34.515595913 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:34.842392921 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:34.850415945 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:34.850471973 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:34.860553026 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:39.133182049 CET4970680192.168.2.6199.232.210.172
                                                                                Nov 20, 2024 11:17:39.133244991 CET49705443192.168.2.620.190.160.17
                                                                                Nov 20, 2024 11:17:39.172506094 CET8049706199.232.210.172192.168.2.6
                                                                                Nov 20, 2024 11:17:39.172537088 CET4434970520.190.160.17192.168.2.6
                                                                                Nov 20, 2024 11:17:39.172584057 CET4970680192.168.2.6199.232.210.172
                                                                                Nov 20, 2024 11:17:39.172610044 CET49705443192.168.2.620.190.160.17
                                                                                Nov 20, 2024 11:17:41.313245058 CET49708443192.168.2.620.190.160.17
                                                                                Nov 20, 2024 11:17:41.321996927 CET4434970820.190.160.17192.168.2.6
                                                                                Nov 20, 2024 11:17:41.322063923 CET49708443192.168.2.620.190.160.17
                                                                                Nov 20, 2024 11:17:54.348195076 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:54.390656948 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:17:54.441829920 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:17:54.484530926 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:18:01.580786943 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:18:01.586103916 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:01.586272001 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:18:01.591296911 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:01.722585917 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:01.765613079 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:18:01.809118032 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:01.819430113 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:18:01.826703072 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:01.826759100 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:18:01.833909035 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:14.364423037 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:14.406234026 CET4998456001192.168.2.6167.114.47.186
                                                                                Nov 20, 2024 11:18:14.494637012 CET5600149984167.114.47.186192.168.2.6
                                                                                Nov 20, 2024 11:18:14.546840906 CET4998456001192.168.2.6167.114.47.186
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Nov 20, 2024 11:16:10.627177000 CET1.1.1.1192.168.2.60xb639No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                Nov 20, 2024 11:16:10.627177000 CET1.1.1.1192.168.2.60xb639No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                                Nov 20, 2024 11:16:20.319084883 CET1.1.1.1192.168.2.60xb55eNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                Nov 20, 2024 11:16:20.319084883 CET1.1.1.1192.168.2.60xb55eNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                Nov 20, 2024 11:16:21.591243029 CET1.1.1.1192.168.2.60xb6acNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                Nov 20, 2024 11:16:21.591243029 CET1.1.1.1192.168.2.60xb6acNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:05:16:03
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\740d3a.msi"
                                                                                Imagebase:0x7ff613a30000
                                                                                File size:69'632 bytes
                                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:05:16:03
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                Imagebase:0x7ff613a30000
                                                                                File size:69'632 bytes
                                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:3
                                                                                Start time:05:16:04
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding BF03D9DA9F637DCB977237F6A9B3752B
                                                                                Imagebase:0x350000
                                                                                File size:59'904 bytes
                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:4
                                                                                Start time:05:16:06
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe"
                                                                                Imagebase:0x580000
                                                                                File size:895'488 bytes
                                                                                MD5 hash:2C0130F614EA8C240320EC47D0008EEA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:5
                                                                                Start time:05:16:07
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
                                                                                Imagebase:0xa20000
                                                                                File size:3'306'790 bytes
                                                                                MD5 hash:35135E7F357C522D07DDD87307C0345C
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Antivirus matches:
                                                                                • Detection: 21%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:6
                                                                                Start time:05:16:08
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-RQURE.tmp\Vista Software.tmp" /SL5="$303F2,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe"
                                                                                Imagebase:0x40000
                                                                                File size:3'615'232 bytes
                                                                                MD5 hash:584586C0CF548DB94F76F124046D58D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:7
                                                                                Start time:05:16:09
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
                                                                                Imagebase:0xa20000
                                                                                File size:3'306'790 bytes
                                                                                MD5 hash:35135E7F357C522D07DDD87307C0345C
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:05:16:09
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -NonInteractive -NoLogo -ExecutionPolicy RemoteSigned -Command "C:\Users\user\AppData\Local\Temp\AI_F78C.ps1 -paths 'C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\file_deleter.ps1','C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\aipackagechainer.exe' -retry_count 10"
                                                                                Imagebase:0xb20000
                                                                                File size:433'152 bytes
                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:9
                                                                                Start time:05:16:10
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:10
                                                                                Start time:05:16:10
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-2LPQH.tmp\Vista Software.tmp" /SL5="$403EC,2100953,1125376,C:\Users\user\AppData\Roaming\Your Company\Your Application\prerequisites\Vista Software\Vista Software.exe" /VERYSILENT
                                                                                Imagebase:0x700000
                                                                                File size:3'615'232 bytes
                                                                                MD5 hash:584586C0CF548DB94F76F124046D58D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:11
                                                                                Start time:05:16:12
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                                                                Imagebase:0xb20000
                                                                                File size:433'152 bytes
                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:12
                                                                                Start time:05:16:12
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:13
                                                                                Start time:05:16:12
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
                                                                                Imagebase:0x7ff7106a0000
                                                                                File size:289'792 bytes
                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:14
                                                                                Start time:05:16:12
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:15
                                                                                Start time:05:16:13
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
                                                                                Imagebase:0xb20000
                                                                                File size:433'152 bytes
                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:16
                                                                                Start time:05:16:13
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:17
                                                                                Start time:05:16:13
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
                                                                                Imagebase:0x7ff7ddfa0000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:18
                                                                                Start time:05:16:13
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\find.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:find /I "wrsa.exe"
                                                                                Imagebase:0x7ff734650000
                                                                                File size:17'920 bytes
                                                                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:19
                                                                                Start time:05:16:14
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
                                                                                Imagebase:0x7ff7106a0000
                                                                                File size:289'792 bytes
                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:20
                                                                                Start time:05:16:14
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:21
                                                                                Start time:05:16:15
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
                                                                                Imagebase:0x7ff7ddfa0000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:22
                                                                                Start time:05:16:15
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\find.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:find /I "opssvc.exe"
                                                                                Imagebase:0x7ff734650000
                                                                                File size:17'920 bytes
                                                                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:23
                                                                                Start time:05:16:15
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
                                                                                Imagebase:0x7ff7106a0000
                                                                                File size:289'792 bytes
                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:24
                                                                                Start time:05:16:15
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:25
                                                                                Start time:05:16:15
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
                                                                                Imagebase:0x7ff7ddfa0000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:26
                                                                                Start time:05:16:15
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\find.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:find /I "avastui.exe"
                                                                                Imagebase:0x7ff734650000
                                                                                File size:17'920 bytes
                                                                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:27
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
                                                                                Imagebase:0x7ff7106a0000
                                                                                File size:289'792 bytes
                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:28
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:29
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
                                                                                Imagebase:0x7ff7ddfa0000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:30
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\find.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:find /I "avgui.exe"
                                                                                Imagebase:0x7ff734650000
                                                                                File size:17'920 bytes
                                                                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:31
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
                                                                                Imagebase:0x7ff7106a0000
                                                                                File size:289'792 bytes
                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:32
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:33
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
                                                                                Imagebase:0x7ff7ddfa0000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:34
                                                                                Start time:05:16:16
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\find.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:find /I "nswscsvc.exe"
                                                                                Imagebase:0x7ff734650000
                                                                                File size:17'920 bytes
                                                                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:35
                                                                                Start time:05:16:17
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
                                                                                Imagebase:0x7ff7106a0000
                                                                                File size:289'792 bytes
                                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:36
                                                                                Start time:05:16:17
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:37
                                                                                Start time:05:16:17
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
                                                                                Imagebase:0x7ff7ddfa0000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:38
                                                                                Start time:05:16:17
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\find.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:find /I "sophoshealth.exe"
                                                                                Imagebase:0x7ff734650000
                                                                                File size:17'920 bytes
                                                                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:39
                                                                                Start time:05:16:17
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Local\clithe\file.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\clithe\\file.exe" "C:\Users\user\AppData\Local\clithe\\millhouse1.a3x"
                                                                                Imagebase:0x2d0000
                                                                                File size:943'784 bytes
                                                                                MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:42
                                                                                Start time:05:17:18
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && file.exe C:\ProgramData\\doW4t2.a3x && del C:\ProgramData\\doW4t2.a3x
                                                                                Imagebase:0x1c0000
                                                                                File size:236'544 bytes
                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:43
                                                                                Start time:05:17:19
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:44
                                                                                Start time:05:17:19
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\SysWOW64\PING.EXE
                                                                                Wow64 process (32bit):true
                                                                                Commandline:ping -n 5 127.0.0.1
                                                                                Imagebase:0xd90000
                                                                                File size:18'944 bytes
                                                                                MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:45
                                                                                Start time:05:17:23
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Local\clithe\file.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:file.exe C:\ProgramData\\doW4t2.a3x
                                                                                Imagebase:0x2d0000
                                                                                File size:943'784 bytes
                                                                                MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:true

                                                                                Target ID:46
                                                                                Start time:05:17:27
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Imagebase:0x850000
                                                                                File size:262'432 bytes
                                                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000002E.00000002.3385347681.0000000002BC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Has exited:false

                                                                                Target ID:47
                                                                                Start time:05:17:36
                                                                                Start date:20/11/2024
                                                                                Path:C:\dbgbkfc\AutoIt3.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                                                                Imagebase:0xd50000
                                                                                File size:943'784 bytes
                                                                                MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:Borland Delphi
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                Has exited:true

                                                                                Target ID:48
                                                                                Start time:05:17:41
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Imagebase:0x770000
                                                                                File size:262'432 bytes
                                                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000030.00000002.3268979112.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Has exited:true

                                                                                Target ID:49
                                                                                Start time:05:17:44
                                                                                Start date:20/11/2024
                                                                                Path:C:\dbgbkfc\AutoIt3.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\dbgbkfc\AutoIt3.exe" C:\dbgbkfc\eeacadf.a3x
                                                                                Imagebase:0xd50000
                                                                                File size:943'784 bytes
                                                                                MD5 hash:3F58A517F1F4796225137E7659AD2ADB
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:Borland Delphi
                                                                                Has exited:true

                                                                                Target ID:50
                                                                                Start time:05:17:48
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                Imagebase:0xfd0000
                                                                                File size:262'432 bytes
                                                                                MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:4.9%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:15.9%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:28
                                                                                  execution_graph 56460 606c70 56470 607643 56460->56470 56471 607651 56470->56471 56472 606c75 56470->56472 56471->56472 56475 60710d 56471->56475 56474 60738c FlsAlloc 56472->56474 56477 60711e 56475->56477 56476 60715a 56491 602301 EnterCriticalSection 56476->56491 56477->56476 56479 6071c6 GetProcAddress 56477->56479 56484 6071b7 56477->56484 56492 6071da LoadLibraryExW GetLastError LoadLibraryExW ___vcrt_FlsSetValue 56477->56492 56479->56476 56481 607163 VirtualProtect 56482 607180 VirtualProtect 56481->56482 56483 6071d4 56481->56483 56482->56483 56485 6071a8 56482->56485 56494 5ffc6b 44 API calls __InternalCxxFrameHandler 56483->56494 56484->56479 56486 6071bf FreeLibrary 56484->56486 56493 602351 LeaveCriticalSection 56485->56493 56486->56479 56490 6071af 56490->56472 56491->56481 56492->56477 56493->56490 56495 604604 56508 60d820 GetEnvironmentStringsW 56495->56508 56497 604615 56498 604627 56497->56498 56499 60461b 56497->56499 56516 604658 44 API calls 3 library calls 56498->56516 56515 606df0 13 API calls 2 library calls 56499->56515 56502 604621 56503 60462e 56517 606df0 13 API calls 2 library calls 56503->56517 56505 60464b 56518 606df0 13 API calls 2 library calls 56505->56518 56507 604651 56509 60d82f 56508->56509 56510 60d831 56508->56510 56509->56497 56519 606e40 56510->56519 56512 60d846 codecvt 56526 606df0 13 API calls 2 library calls 56512->56526 56514 60d860 FreeEnvironmentStringsW 56514->56497 56515->56502 56516->56503 56517->56505 56518->56507 56520 606e81 56519->56520 56524 606e4e __Wcrtomb 56519->56524 56528 5f9d3e 13 API calls __Wcrtomb 56520->56528 56522 606e6c RtlAllocateHeap 56523 606e7f 56522->56523 56522->56524 56523->56512 56524->56520 56524->56522 56527 603cf0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 56524->56527 56526->56514 56527->56524 56528->56523 56529 583850 56530 58385c 56529->56530 56531 5838a2 56529->56531 56530->56531 56533 583620 56530->56533 56534 58362e 56533->56534 56537 5f6215 56534->56537 56536 58363b RtlAllocateHeap 56536->56531 56538 5f625c RaiseException 56537->56538 56539 5f622f 56537->56539 56538->56536 56539->56538 56540 58b870 56541 58b9bf 56540->56541 56542 58b8a5 56540->56542 56543 583620 2 API calls 56541->56543 56549 58b9a6 56541->56549 56542->56541 56560 58ab00 56542->56560 56545 58ba16 56543->56545 56546 583620 2 API calls 56545->56546 56548 58ba20 56546->56548 56547 58b9f3 56550 58b917 56559 58b96a 56550->56559 56713 5839b0 56550->56713 56553 58b8c4 56553->56541 56553->56547 56553->56550 56555 58b92f 56728 585060 56555->56728 56738 58c3a0 74 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 56559->56738 56561 58ab5b 56560->56561 56562 58b436 56560->56562 56561->56562 56563 58ab64 56561->56563 56564 583620 2 API calls 56562->56564 56565 58ac39 56563->56565 56567 5839b0 54 API calls 56563->56567 56566 58b440 56564->56566 56739 5f2684 56565->56739 57081 5f98af 44 API calls 2 library calls 56566->57081 56583 58ab85 56567->56583 56570 58b445 57082 5ff99b 44 API calls 3 library calls 56570->57082 56571 58ac59 56749 58d0b0 56571->56749 56572 58b45b 56576 583620 2 API calls 56572->56576 56575 58b44a 57083 5f2e9d 45 API calls 2 library calls 56575->57083 56579 58b465 56576->56579 56581 583620 2 API calls 56579->56581 56584 58b46f 56581->56584 56583->56572 56586 585060 46 API calls 56583->56586 56587 583620 2 API calls 56584->56587 56589 58abc4 56586->56589 56590 58b479 __InternalCxxFrameHandler 56587->56590 56591 58abec 56589->56591 56594 58abdb 56589->56594 57084 5869b0 56590->57084 57033 5aa750 147 API calls 56591->57033 56597 585060 46 API calls 56594->56597 56596 58abfd 56596->56565 56597->56591 56601 583c00 46 API calls 56602 58b589 56601->56602 56604 5f43d4 std::_Facet_Register 3 API calls 56602->56604 56603 58acd0 56836 5a6ce0 56603->56836 56606 58b5d9 56604->56606 56608 5ffbcc 54 API calls 56606->56608 56607 58adf0 56856 586bc0 56607->56856 56610 58b60e 56608->56610 56612 58b71b 56610->56612 56613 58b61f 56610->56613 57102 5f2e9d 45 API calls 2 library calls 56612->57102 56615 594840 49 API calls 56613->56615 56619 58b64c 56615->56619 56617 58ae0c 56618 583c00 46 API calls 56617->56618 56621 58ae30 56618->56621 56620 58b72c 56619->56620 56622 58b663 56619->56622 57103 5ff99b 44 API calls 3 library calls 56620->57103 56873 586700 56621->56873 56624 58b731 56622->56624 56626 58b6a5 error_info_injector 56622->56626 57104 5f98af 44 API calls 2 library calls 56624->57104 56629 5843b0 44 API calls 56626->56629 56628 58ae48 56632 583c00 46 API calls 56628->56632 56659 58aed2 56628->56659 56631 58b6d2 56629->56631 56633 5843b0 44 API calls 56631->56633 56634 58ae74 56632->56634 56635 58b6e1 56633->56635 56637 586700 lstrcmpiW 56634->56637 56638 5843b0 44 API calls 56635->56638 56636 5843b0 44 API calls 56643 58aefa error_info_injector 56636->56643 56639 58ae8f 56637->56639 56640 58b700 56638->56640 56646 583c00 46 API calls 56639->56646 56639->56659 56644 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56640->56644 56641 58afc8 56878 5f43d4 56641->56878 56642 58b069 56915 5a4710 56642->56915 56643->56566 56652 58afa0 error_info_injector 56643->56652 56647 58b717 56644->56647 56651 58aeb7 56646->56651 56647->56553 56656 586700 lstrcmpiW 56651->56656 56652->56641 56652->56642 56653 58b121 56657 5839b0 54 API calls 56653->56657 56654 58b076 56662 583c00 46 API calls 56654->56662 56656->56659 56660 58b126 56657->56660 56658 58b00f 56658->56575 56900 594840 56658->56900 56659->56636 56659->56643 56660->56572 56661 58b131 56660->56661 56668 58b15c 56661->56668 56669 58b167 56661->56669 56664 58b0ac 56662->56664 56666 583c00 46 API calls 56664->56666 56665 58b03c 56665->56570 56688 58b05e 56665->56688 56670 58b0e9 56666->56670 56667 58b2d0 56671 58b35c 56667->56671 56675 5839b0 54 API calls 56667->56675 57035 585350 56668->57035 57048 585680 56669->57048 57034 58ba30 173 API calls 4 library calls 56670->57034 56953 58c8d0 56671->56953 56680 58b2e2 56675->56680 56677 5839b0 54 API calls 56682 58b1f1 56677->56682 56678 58b165 56933 5a7bd0 56678->56933 56679 58b101 56683 5843b0 44 API calls 56679->56683 56680->56584 56685 58b2ec 56680->56685 56681 58b370 56971 5bff10 56681->56971 56682->56579 56686 58b1fb 56682->56686 56687 58b110 56683->56687 56693 585060 46 API calls 56685->56693 56692 585060 46 API calls 56686->56692 56689 5843b0 44 API calls 56687->56689 56688->56667 56688->56671 56688->56677 56689->56688 56690 58b39b 56691 58b3b6 Sleep 56690->56691 56700 58b3c1 56690->56700 56691->56700 56694 58b225 56692->56694 56695 58b316 56693->56695 57070 5a9710 70 API calls 56694->57070 57072 5a5f60 68 API calls 56695->57072 56698 58b326 57073 5aa750 147 API calls 56698->57073 56699 58b23a 56702 58b269 56699->56702 56707 58b25b 56699->56707 56703 5843b0 44 API calls 56700->56703 57071 5aa750 147 API calls 56702->57071 56706 58b413 56703->56706 56704 58b331 56704->56671 57074 5f43af 56706->57074 56709 585060 46 API calls 56707->56709 56709->56702 56710 58b42d 56710->56553 56711 58b277 56711->56667 56714 5839e8 56713->56714 56725 583a3c 56713->56725 57542 5f46af AcquireSRWLockExclusive 56714->57542 56716 5f46af 3 API calls 56718 583a56 56716->56718 56717 5839f2 56719 5839fe GetProcessHeap 56717->56719 56717->56725 56727 583ac7 56718->56727 57549 5f494f 47 API calls 56718->57549 57547 5f494f 47 API calls 56719->57547 56721 583a2b 57548 5f465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 56721->57548 56724 583ab6 57550 5f465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 56724->57550 56725->56716 56725->56727 56727->56545 56727->56555 56732 5850f3 codecvt 56728->56732 56734 585088 __InternalCxxFrameHandler ___crtLCMapStringW 56728->56734 56729 583620 2 API calls 56730 585140 56729->56730 56731 585121 56737 5aa750 147 API calls 56731->56737 56732->56729 56732->56731 56734->56732 57552 5f9d3e 13 API calls __Wcrtomb 56734->57552 56735 58510f 57553 5f989f 44 API calls _Ungetc 56735->57553 56737->56559 56738->56549 56740 5f2690 __EH_prolog3 56739->56740 57105 5f28c7 56740->57105 56745 5f26ae 57119 5f280a 46 API calls std::locale::_Setgloballocale 56745->57119 56746 5f2709 __Wcrtomb 56746->56571 56748 5f26b6 std::locale::_Locimp::_Locimp 57111 5f291f 56748->57111 56750 5f28c7 std::_Lockit::_Lockit 45 API calls 56749->56750 56751 58d0f2 56750->56751 56752 5f28c7 std::_Lockit::_Lockit 45 API calls 56751->56752 56757 58d13c 56751->56757 56753 58d114 56752->56753 56755 5f291f std::_Lockit::~_Lockit 2 API calls 56753->56755 56754 5f291f std::_Lockit::~_Lockit 2 API calls 56756 58d28c 56754->56756 56755->56757 56758 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56756->56758 56759 5f43d4 std::_Facet_Register 3 API calls 56757->56759 56773 58d188 56757->56773 56760 58ac6f 56758->56760 56761 58d196 56759->56761 56774 588d00 56760->56774 57124 594420 44 API calls 3 library calls 56761->57124 56763 58d1ae 57125 5892d0 73 API calls 2 library calls 56763->57125 56765 58d1ca 57126 5f30ea 44 API calls __Getcoll 56765->57126 56767 58d206 57127 58a5f0 72 API calls 2 library calls 56767->57127 56769 58d229 57128 583e10 44 API calls 2 library calls 56769->57128 56771 58d23e 57129 5f2652 RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 56771->57129 56773->56754 56775 5f28c7 std::_Lockit::_Lockit 45 API calls 56774->56775 56776 588d4f 56775->56776 56777 5f28c7 std::_Lockit::_Lockit 45 API calls 56776->56777 56781 588d99 56776->56781 56778 588d71 56777->56778 56782 5f291f std::_Lockit::~_Lockit 2 API calls 56778->56782 56779 588df1 56780 5f291f std::_Lockit::~_Lockit 2 API calls 56779->56780 56783 588f10 56780->56783 56781->56779 56784 5f43d4 std::_Facet_Register 3 API calls 56781->56784 56782->56781 56795 58cee0 56783->56795 56785 588dff 56784->56785 57130 5892d0 73 API calls 2 library calls 56785->57130 56787 588e32 57131 5f2cc2 44 API calls 2 library calls 56787->57131 56789 588e7a 57132 5f2963 44 API calls 3 library calls 56789->57132 56791 588e8d 57133 58a5f0 72 API calls 2 library calls 56791->57133 56793 588ecf 57134 5f2652 RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 56793->57134 56796 5f43d4 std::_Facet_Register 3 API calls 56795->56796 56797 58cf73 56796->56797 57135 58e0a0 56797->57135 56802 58d02c 57154 58dfd0 56802->57154 56803 58d0a3 57165 58dae0 45 API calls 56803->57165 56809 58d03f 57161 594650 56809->57161 56811 58ac96 56812 58d510 56811->56812 56813 58d548 56812->56813 56814 58d55c 56812->56814 56813->56603 57194 58d880 45 API calls __InternalCxxFrameHandler 56814->57194 56816 58d589 57195 58e480 45 API calls __InternalCxxFrameHandler 56816->57195 56818 58d5a2 57200 58da10 44 API calls 2 library calls 56818->57200 56820 58d59e 56820->56818 57196 58e150 45 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 56820->57196 56822 58d63c 57201 58da10 44 API calls 2 library calls 56822->57201 56824 58d60f 57199 58e480 45 API calls __InternalCxxFrameHandler 56824->57199 56825 58d652 56826 594650 44 API calls 56825->56826 56829 58d667 56826->56829 57202 58da10 44 API calls 2 library calls 56829->57202 56830 58d5dc 56830->56818 56830->56824 57197 58e480 45 API calls __InternalCxxFrameHandler 56830->57197 57198 58e150 45 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 56830->57198 56832 58d689 56834 594650 44 API calls 56832->56834 56835 58d6a7 56834->56835 56835->56603 57203 59e310 56836->57203 56838 58adb5 56839 583c00 56838->56839 56840 583cd1 56839->56840 56843 583c14 56839->56843 57273 583ea0 45 API calls 56840->57273 56842 583c6d 56855 583c19 codecvt 56842->56855 57274 5f98af 44 API calls 2 library calls 56842->57274 56845 583ccc 56843->56845 56847 583c9b 56843->56847 56848 583c60 56843->56848 56843->56855 57272 5842d0 RaiseException std::_Facet_Register CallUnexpected 56845->57272 56853 5f43d4 std::_Facet_Register 3 API calls 56847->56853 56848->56845 56850 583c67 56848->56850 56854 5f43d4 std::_Facet_Register 3 API calls 56850->56854 56853->56855 56854->56842 56855->56607 57275 582040 56856->57275 56858 586c08 57292 586cc0 56858->57292 56862 586c36 56864 586c58 codecvt 56862->56864 57324 582940 45 API calls 4 library calls 56862->57324 56863 5843b0 44 API calls 56866 586c95 56863->56866 56864->56863 56867 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56866->56867 56868 586cad 56867->56868 56869 5843b0 56868->56869 56870 5843fe error_info_injector 56869->56870 56872 5843dd 56869->56872 56870->56617 56872->56617 56872->56869 56872->56870 57333 5f98af 44 API calls 2 library calls 56872->57333 56875 58671a 56873->56875 56876 5867ad 56873->56876 56874 586866 56874->56628 56875->56628 56876->56874 56877 58684a lstrcmpiW 56876->56877 56877->56628 56879 5f43d9 ___std_exception_copy 56878->56879 56880 58afd6 56879->56880 56882 5f43f5 std::_Facet_Register 56879->56882 57334 603cf0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 56879->57334 56885 5ffbcc 56880->56885 56883 5f6215 CallUnexpected RaiseException 56882->56883 56884 5f5331 56883->56884 56886 5ffbed 56885->56886 56887 5ffbd9 56885->56887 57337 5ffb7c 16 API calls 2 library calls 56886->57337 57335 5f9d3e 13 API calls __Wcrtomb 56887->57335 56890 5ffbf9 56893 5ffc02 CreateThread 56890->56893 56895 5ffc2d 56890->56895 56891 5ffbde 57336 5f989f 44 API calls _Ungetc 56891->57336 56893->56895 56896 5ffc21 GetLastError 56893->56896 57340 5ffa70 49 API calls 2 library calls 56893->57340 56894 5ffbe9 56894->56658 57339 5ffaee 15 API calls ___free_lconv_mon 56895->57339 57338 5f9ce2 13 API calls 2 library calls 56896->57338 56899 5ffc38 56899->56658 56901 594850 GetCurrentThreadId 56900->56901 56902 594877 56900->56902 56903 59485a 56901->56903 56904 59487e 56901->56904 57342 5f2e9d 45 API calls 2 library calls 56902->57342 57341 5f2f0c WaitForSingleObjectEx GetExitCodeThread CloseHandle 56903->57341 57343 5f2e9d 45 API calls 2 library calls 56904->57343 56908 594866 56909 594885 56908->56909 56911 59486d 56908->56911 57344 5f2e9d 45 API calls 2 library calls 56909->57344 56911->56665 56916 5a475d GetCurrentProcess OpenProcessToken 56915->56916 56918 5a4779 GetLastError 56916->56918 56919 5a4786 GetTokenInformation 56916->56919 56920 5a4830 56918->56920 56921 5a47d7 56919->56921 56922 5a47a7 GetLastError 56919->56922 56923 5a485b CloseHandle 56920->56923 56924 5a4869 56920->56924 56925 5a482a GetLastError 56921->56925 56927 5a47dd AllocateAndInitializeSid 56921->56927 56922->56925 56926 5a47b2 56922->56926 56923->56924 56928 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56924->56928 56925->56920 57345 5a4890 56926->57345 56927->56920 56930 5a480e EqualSid FreeSid 56927->56930 56931 58b06e 56928->56931 56930->56920 56931->56653 56931->56654 56934 5a6ce0 65 API calls 56933->56934 56935 5a7c3f 56934->56935 56936 5a7c95 56935->56936 56937 5a7c75 56935->56937 56939 586070 46 API calls 56936->56939 57352 5a6400 56937->57352 56940 5a7c7f 56939->56940 56941 586070 46 API calls 56940->56941 56943 5a7cbc 56941->56943 56942 5a6ce0 65 API calls 56944 5a7d45 ShellExecuteExW 56942->56944 56943->56942 56945 5a7d5e 56944->56945 56946 5a7d71 56944->56946 56947 5a7d65 GetLastError 56945->56947 56952 5a7d6d 56945->56952 56948 5a7d78 WaitForSingleObject 56946->56948 56946->56952 56947->56952 56949 5a7d88 GetExitCodeProcess 56948->56949 56950 5a7d92 56948->56950 56949->56950 56951 5a7d99 CloseHandle 56950->56951 56950->56952 56951->56952 56952->56688 56954 5839b0 54 API calls 56953->56954 56955 58c900 56954->56955 56956 58c90a 56955->56956 56957 58c9bb 56955->56957 57393 58cb10 56956->57393 56958 583620 2 API calls 56957->56958 56959 58c9c5 56958->56959 56960 583620 2 API calls 56959->56960 56961 58c9cf 56960->56961 56961->56681 56964 58c93a WideCharToMultiByte 56965 58c997 56964->56965 56967 58c956 56964->56967 57410 58cbf0 RtlAllocateHeap RaiseException 56965->57410 56968 58c971 WideCharToMultiByte 56967->56968 57409 58ccb0 46 API calls 56967->57409 56968->56959 56970 58c98c 56968->56970 56970->56681 56972 5839b0 54 API calls 56971->56972 56973 5bff3f 56972->56973 56974 5bfff9 56973->56974 56976 5bff49 56973->56976 56975 583620 2 API calls 56974->56975 56977 5c0003 56975->56977 57007 5bff10 84 API calls 56976->57007 57414 5f151e 56976->57414 57417 5f1564 56976->57417 57420 5f1541 56976->57420 57423 5f1500 56976->57423 57426 5f157d 56976->57426 57429 5f155a 56976->57429 57432 5f1514 56976->57432 57435 5f1573 56976->57435 57438 5f1546 56976->57438 57441 5f1532 56976->57441 57444 5f1550 56976->57444 57447 5f150a 56976->57447 57450 5f1528 56976->57450 57453 5f1587 56976->57453 56979 5839b0 54 API calls 56977->56979 56978 5bff80 56980 5bff89 RegCreateKeyA RegSetValueExA 56978->56980 56987 5bff84 56978->56987 56981 5c00d0 56979->56981 56980->56987 56982 5c017f 56981->56982 56983 5c00da 56981->56983 56984 583620 2 API calls 56982->56984 56989 58cb10 57 API calls 56983->56989 56985 5c0189 56984->56985 56986 5839b0 54 API calls 56985->56986 56988 5c01c0 56986->56988 56987->56690 56991 583620 2 API calls 56988->56991 57002 5c01ca 56988->57002 56990 5c0104 56989->56990 56992 5c0114 56990->56992 57456 59e8c0 46 API calls 5 library calls 56990->57456 56993 5c0286 RegOpenKeyA 56991->56993 57018 5f151e 17 API calls 56992->57018 57019 5f157d 17 API calls 56992->57019 57020 5f155a 17 API calls 56992->57020 57021 5bff10 84 API calls 56992->57021 57022 5f1514 17 API calls 56992->57022 57023 5f1573 17 API calls 56992->57023 57024 5f1532 17 API calls 56992->57024 57025 5f1550 17 API calls 56992->57025 57026 5f150a 17 API calls 56992->57026 57027 5f1528 17 API calls 56992->57027 57028 5f1587 17 API calls 56992->57028 57029 5f1546 17 API calls 56992->57029 57030 5f1564 17 API calls 56992->57030 57031 5f1541 17 API calls 56992->57031 57032 5f1500 17 API calls 56992->57032 56995 5c03a3 56993->56995 56999 5c02d2 56993->56999 56995->56690 56996 5c012f 56997 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56996->56997 56998 5c0179 56997->56998 56998->56690 57001 5c0362 56999->57001 57457 59e8c0 46 API calls 5 library calls 56999->57457 57001->56690 57002->56690 57007->56978 57018->56996 57019->56996 57020->56996 57021->56996 57022->56996 57023->56996 57024->56996 57025->56996 57026->56996 57027->56996 57028->56996 57029->56996 57030->56996 57031->56996 57032->56996 57033->56596 57034->56679 57527 585150 10 API calls 57035->57527 57037 585360 57038 5853e2 57037->57038 57039 585366 FindResourceW 57037->57039 57038->56678 57039->57038 57040 58537d 57039->57040 57528 585210 LoadResource LockResource SizeofResource 57040->57528 57042 585387 57042->57038 57529 5f9d53 44 API calls 3 library calls 57042->57529 57044 5853be 57045 5853ce 57044->57045 57046 583620 2 API calls 57044->57046 57045->56678 57047 5853f4 57046->57047 57049 585698 57048->57049 57050 58568d 57048->57050 57055 585724 57049->57055 57056 5856e8 57049->57056 57061 585717 codecvt 57049->57061 57530 585400 57050->57530 57053 583620 2 API calls 57054 58578c 57053->57054 57058 58572e 57055->57058 57055->57061 57063 585711 __InternalCxxFrameHandler 57055->57063 57059 585700 57056->57059 57060 5856f3 57056->57060 57056->57061 57057 58576f 57057->56678 57537 5f9d3e 13 API calls __Wcrtomb 57058->57537 57059->57063 57064 585704 57059->57064 57535 5f9d3e 13 API calls __Wcrtomb 57060->57535 57061->57053 57061->57057 57063->57061 57538 5f9d3e 13 API calls __Wcrtomb 57063->57538 57536 5f9d3e 13 API calls __Wcrtomb 57064->57536 57066 5856f8 57539 5f989f 44 API calls _Ungetc 57066->57539 57070->56699 57071->56711 57072->56698 57073->56704 57075 5f43b8 IsProcessorFeaturePresent 57074->57075 57076 5f43b7 57074->57076 57078 5f4470 57075->57078 57076->56710 57540 5f4433 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 57078->57540 57080 5f4553 57080->56710 57082->56575 57085 586a06 57084->57085 57091 586a13 57084->57091 57086 582040 46 API calls 57085->57086 57087 586a0e 57086->57087 57090 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57087->57090 57088 586b80 57089 582040 46 API calls 57088->57089 57089->57087 57093 586baf 57090->57093 57091->57088 57092 586a51 PathIsUNCW 57091->57092 57094 586a66 57092->57094 57095 586b3a 57092->57095 57093->56601 57094->57088 57096 586a94 57094->57096 57095->57088 57097 586b64 57095->57097 57098 582040 46 API calls 57096->57098 57099 582040 46 API calls 57097->57099 57100 586a9d codecvt 57098->57100 57099->57100 57541 587280 45 API calls 57100->57541 57103->56624 57106 5f28dd 57105->57106 57107 5f28d6 57105->57107 57109 5f269b 57106->57109 57121 5f405f EnterCriticalSection 57106->57121 57120 602368 44 API calls 2 library calls 57107->57120 57109->56748 57118 5f27e7 RaiseException EnterCriticalSection LeaveCriticalSection std::locale::_Locimp::_Locimp std::_Facet_Register 57109->57118 57112 602376 57111->57112 57113 5f2929 57111->57113 57123 602351 LeaveCriticalSection 57112->57123 57114 5f293c 57113->57114 57122 5f406d LeaveCriticalSection 57113->57122 57114->56746 57117 60237d 57117->56746 57118->56745 57119->56748 57120->57109 57121->57109 57122->57114 57123->57117 57124->56763 57125->56765 57126->56767 57127->56769 57128->56771 57129->56773 57130->56787 57131->56789 57132->56791 57133->56793 57134->56779 57136 5f43d4 std::_Facet_Register 3 API calls 57135->57136 57137 58d01a 57136->57137 57138 58dd40 57137->57138 57166 58ed00 57138->57166 57141 58dd9c 57143 5f43d4 std::_Facet_Register 3 API calls 57141->57143 57142 58d024 57142->56802 57142->56803 57145 58ddab 57143->57145 57144 58f270 3 API calls 57146 58dd94 57144->57146 57148 5f43d4 std::_Facet_Register 3 API calls 57145->57148 57147 58dfd0 3 API calls 57146->57147 57147->57141 57149 58de19 57148->57149 57149->57142 57150 58ed00 45 API calls 57149->57150 57151 58f270 3 API calls 57149->57151 57152 5f43d4 std::_Facet_Register 3 API calls 57149->57152 57153 58dfd0 3 API calls 57149->57153 57150->57149 57151->57149 57152->57149 57153->57149 57155 58e003 57154->57155 57156 5f43d4 std::_Facet_Register 3 API calls 57155->57156 57157 58d035 57156->57157 57158 58f270 57157->57158 57159 5f43d4 std::_Facet_Register 3 API calls 57158->57159 57160 58f29d 57159->57160 57160->56809 57162 59467b 57161->57162 57163 59469b error_info_injector 57161->57163 57162->57161 57162->57163 57193 5f98af 44 API calls 2 library calls 57162->57193 57163->56811 57167 58dd7b 57166->57167 57180 58ed15 57166->57180 57167->57141 57167->57142 57167->57144 57168 58f253 57190 58dae0 45 API calls 57168->57190 57169 58f270 RaiseException EnterCriticalSection LeaveCriticalSection 57169->57180 57171 58f25a 57191 58dae0 45 API calls 57171->57191 57174 58f261 57192 58dae0 45 API calls 57174->57192 57175 58f24c 57189 58dae0 45 API calls 57175->57189 57180->57167 57180->57168 57180->57169 57180->57171 57180->57174 57180->57175 57184 5901b0 45 API calls std::_Facet_Register 57180->57184 57185 5900d0 45 API calls 57180->57185 57186 590340 45 API calls 57180->57186 57187 590740 45 API calls 3 library calls 57180->57187 57188 590510 45 API calls 57180->57188 57184->57180 57185->57180 57186->57180 57187->57180 57188->57180 57194->56816 57195->56820 57196->56830 57197->56830 57198->56830 57199->56818 57200->56822 57201->56825 57202->56832 57204 59e36a 57203->57204 57205 59e4d7 57203->57205 57208 59e3bc 57204->57208 57210 59e38c 57204->57210 57206 583620 2 API calls 57205->57206 57207 59e4e1 57206->57207 57266 5855b0 46 API calls 57207->57266 57213 5839b0 54 API calls 57208->57213 57233 59e3e1 57208->57233 57247 586070 57210->57247 57211 59e4e6 57214 583620 2 API calls 57211->57214 57213->57233 57216 59e4f0 57214->57216 57215 59e394 57215->56838 57217 59e53e 57216->57217 57218 59e711 57216->57218 57220 59e5a8 57217->57220 57223 59e54b 57217->57223 57219 583620 2 API calls 57218->57219 57230 59e6bb 57219->57230 57221 59e690 57220->57221 57222 59e5b3 57220->57222 57228 5839b0 54 API calls 57221->57228 57235 59e6d4 57221->57235 57229 5839b0 54 API calls 57222->57229 57240 59e5d8 57222->57240 57223->57221 57232 59e580 std::_Locinfo::_Locinfo_dtor 57223->57232 57224 59e4cd 57226 583620 2 API calls 57224->57226 57225 583620 2 API calls 57227 59e725 57225->57227 57226->57205 57228->57230 57231 59e5e6 57229->57231 57230->57225 57230->57235 57231->57230 57231->57240 57234 59e310 65 API calls 57232->57234 57233->57207 57233->57211 57233->57224 57238 59e460 __InternalCxxFrameHandler 57233->57238 57236 59e5a3 57234->57236 57235->56838 57236->56838 57237 59e47c codecvt 57237->56838 57238->57237 57264 5f9d3e 13 API calls __Wcrtomb 57238->57264 57242 59e64a 57240->57242 57243 59e63d 57240->57243 57241 59e49e 57265 5f989f 44 API calls _Ungetc 57241->57265 57245 585680 46 API calls 57242->57245 57246 585350 55 API calls 57243->57246 57245->57236 57246->57236 57249 586084 57247->57249 57248 586097 57248->57215 57249->57248 57250 586143 57249->57250 57255 5860c1 __InternalCxxFrameHandler 57249->57255 57271 5855b0 46 API calls 57250->57271 57252 5860e7 57267 5f9d3e 13 API calls __Wcrtomb 57252->57267 57253 586148 57255->57252 57256 586106 codecvt 57255->57256 57259 586128 57255->57259 57256->57215 57257 5860ec 57268 5f989f 44 API calls _Ungetc 57257->57268 57259->57256 57269 5f9d3e 13 API calls __Wcrtomb 57259->57269 57260 5860f7 57260->57215 57262 586131 57270 5f989f 44 API calls _Ungetc 57262->57270 57264->57241 57265->57237 57266->57211 57267->57257 57268->57260 57269->57262 57270->57256 57271->57253 57278 582066 57275->57278 57276 582121 57326 583ea0 45 API calls 57276->57326 57278->57276 57281 58211c 57278->57281 57283 5820f0 57278->57283 57284 5820b5 57278->57284 57291 58207b codecvt 57278->57291 57279 5820c2 57279->57291 57327 5f98af 44 API calls 2 library calls 57279->57327 57325 5842d0 RaiseException std::_Facet_Register CallUnexpected 57281->57325 57286 5f43d4 std::_Facet_Register 3 API calls 57283->57286 57284->57281 57287 5820bc 57284->57287 57286->57291 57290 5f43d4 std::_Facet_Register 3 API calls 57287->57290 57290->57279 57291->56858 57293 586d39 57292->57293 57294 586d44 57293->57294 57300 586e3c 57293->57300 57295 586f7e 57294->57295 57296 586d61 57294->57296 57328 582440 45 API calls 57295->57328 57298 583c00 46 API calls 57296->57298 57311 586d85 57298->57311 57299 586e26 error_info_injector 57304 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57299->57304 57300->57299 57302 586f88 57300->57302 57303 586e93 57300->57303 57301 586f83 57329 5f98af 44 API calls 2 library calls 57301->57329 57330 582440 45 API calls 57302->57330 57306 583c00 46 API calls 57303->57306 57307 586c1d 57304->57307 57312 586eb7 57306->57312 57317 586f90 57307->57317 57310 586db4 57315 5843b0 44 API calls 57310->57315 57311->57310 57313 5843b0 44 API calls 57311->57313 57314 5843b0 44 API calls 57312->57314 57313->57310 57314->57299 57316 586de4 57315->57316 57316->57299 57316->57301 57323 58700c codecvt 57317->57323 57318 58722b error_info_injector 57318->56862 57320 587279 57332 582440 45 API calls 57320->57332 57323->57318 57323->57320 57331 5f98af 44 API calls 2 library calls 57323->57331 57324->56864 57334->56879 57335->56891 57336->56894 57337->56890 57338->56895 57339->56899 57341->56908 57348 5f49c5 57345->57348 57349 5f4970 57348->57349 57350 5f43d4 std::_Facet_Register 3 API calls 57349->57350 57351 5a47bd GetTokenInformation 57350->57351 57351->56921 57351->56925 57353 5a643f 57352->57353 57354 5a6459 57353->57354 57355 5a644c 57353->57355 57356 5839b0 54 API calls 57354->57356 57357 59e310 65 API calls 57355->57357 57358 5a645e 57356->57358 57360 5a6457 57357->57360 57359 583620 2 API calls 57358->57359 57358->57360 57361 5a64a6 57359->57361 57360->56940 57362 5a64ee 57361->57362 57365 5a6511 57361->57365 57363 5839b0 54 API calls 57362->57363 57364 5a64f3 57363->57364 57366 583620 2 API calls 57364->57366 57369 5a64f9 57364->57369 57367 59e310 65 API calls 57365->57367 57368 5a6572 57366->57368 57367->57369 57370 586070 46 API calls 57368->57370 57369->56940 57371 5a65c3 57370->57371 57372 585060 46 API calls 57371->57372 57373 5a65e7 57372->57373 57389 581c90 56 API calls __InternalCxxFrameHandler 57373->57389 57375 5a65ef 57390 5a3b60 71 API calls ___crtLCMapStringW 57375->57390 57377 5a671a 57392 581d60 FindClose 57377->57392 57379 5a6726 57381 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57379->57381 57384 5a6769 57381->57384 57382 5a66a2 GetFileAttributesW 57385 5a66af SetFileAttributesW 57382->57385 57388 5a6674 57382->57388 57383 5a65ff 57383->57377 57383->57382 57383->57388 57391 5a4020 66 API calls 57383->57391 57384->56940 57385->57388 57386 5a667e GetFileAttributesW 57387 5a668b SetFileAttributesW 57386->57387 57386->57388 57387->57388 57388->57383 57388->57386 57389->57375 57390->57383 57391->57383 57392->57379 57394 58c932 57393->57394 57395 58cb24 57393->57395 57394->56964 57394->56965 57394->56970 57395->57394 57411 585150 10 API calls 57395->57411 57397 58cb39 57397->57394 57398 58cb43 FindResourceW 57397->57398 57398->57394 57399 58cb57 57398->57399 57412 585210 LoadResource LockResource SizeofResource 57399->57412 57401 58cb61 57401->57394 57402 58cb6a WideCharToMultiByte 57401->57402 57403 58cb8a 57402->57403 57404 58cbd6 57402->57404 57405 58cba5 WideCharToMultiByte 57403->57405 57413 58ccb0 46 API calls 57403->57413 57406 583620 2 API calls 57404->57406 57405->57394 57405->57404 57408 58cbe0 57406->57408 57409->56968 57410->56970 57411->57397 57412->57401 57413->57405 57415 5f14ef 57414->57415 57458 5f1934 57415->57458 57418 5f14ef 57417->57418 57419 5f1934 ___delayLoadHelper2@8 17 API calls 57418->57419 57419->57418 57421 5f14ef 57420->57421 57422 5f1934 ___delayLoadHelper2@8 17 API calls 57421->57422 57422->57421 57424 5f14ef 57423->57424 57425 5f1934 ___delayLoadHelper2@8 17 API calls 57424->57425 57425->57424 57428 5f14ef 57426->57428 57427 5f1934 ___delayLoadHelper2@8 17 API calls 57427->57428 57428->57427 57430 5f14ef 57429->57430 57430->57429 57431 5f1934 ___delayLoadHelper2@8 17 API calls 57430->57431 57431->57430 57433 5f14ef 57432->57433 57434 5f1934 ___delayLoadHelper2@8 17 API calls 57433->57434 57434->57433 57436 5f14ef 57435->57436 57437 5f1934 ___delayLoadHelper2@8 17 API calls 57436->57437 57437->57436 57440 5f14ef 57438->57440 57439 5f1934 ___delayLoadHelper2@8 17 API calls 57439->57440 57440->57439 57443 5f14ef 57441->57443 57442 5f1934 ___delayLoadHelper2@8 17 API calls 57442->57443 57443->57442 57445 5f14ef 57444->57445 57446 5f1934 ___delayLoadHelper2@8 17 API calls 57445->57446 57446->57445 57448 5f14ef 57447->57448 57449 5f1934 ___delayLoadHelper2@8 17 API calls 57448->57449 57449->57448 57452 5f14ef 57450->57452 57451 5f1934 ___delayLoadHelper2@8 17 API calls 57451->57452 57452->57451 57454 5f14ef 57453->57454 57455 5f1934 ___delayLoadHelper2@8 17 API calls 57454->57455 57455->57454 57456->56992 57457->57001 57486 5f1608 57458->57486 57460 5f1944 57461 5f19a1 57460->57461 57471 5f19c5 57460->57471 57508 5f1894 8 API calls ___delayLoadHelper2@8 57461->57508 57463 5f19ac RaiseException 57464 5f1ba2 57463->57464 57464->57415 57465 5f1a3d LoadLibraryExA 57466 5f1a9e 57465->57466 57467 5f1a50 GetLastError 57465->57467 57470 5f1ab0 57466->57470 57473 5f1aa9 FreeLibrary 57466->57473 57474 5f1a79 57467->57474 57475 5f1a63 57467->57475 57468 5f1b6c 57498 5f15aa 57468->57498 57469 5f1b0e GetProcAddress 57469->57468 57478 5f1b1e GetLastError 57469->57478 57470->57468 57470->57469 57471->57465 57471->57466 57471->57470 57476 5f1b79 57471->57476 57473->57470 57509 5f1894 8 API calls ___delayLoadHelper2@8 57474->57509 57475->57466 57475->57474 57511 5f1894 8 API calls ___delayLoadHelper2@8 57476->57511 57480 5f1b31 57478->57480 57479 5f1a84 RaiseException 57479->57464 57480->57468 57510 5f1894 8 API calls ___delayLoadHelper2@8 57480->57510 57483 5f1b52 RaiseException 57484 5f1608 ___delayLoadHelper2@8 8 API calls 57483->57484 57485 5f1b69 57484->57485 57485->57468 57487 5f1647 57486->57487 57488 5f1614 57486->57488 57487->57460 57488->57487 57512 5f16be 57488->57512 57490 5f1622 57491 5f1642 57490->57491 57492 5f1632 57490->57492 57523 5f1648 GetModuleHandleW GetProcAddress GetProcAddress 57491->57523 57517 5f17ec 57492->57517 57495 5f18dc 57496 5f18f8 57495->57496 57497 5f18f4 ReleaseSRWLockExclusive 57495->57497 57496->57460 57497->57460 57499 5f15fa 57498->57499 57500 5f15bc 57498->57500 57499->57476 57500->57499 57501 5f16be ___delayLoadHelper2@8 4 API calls 57500->57501 57502 5f15ca 57501->57502 57503 5f17ec ___delayLoadHelper2@8 3 API calls 57502->57503 57504 5f15db 57503->57504 57505 5f17ec ___delayLoadHelper2@8 3 API calls 57504->57505 57506 5f15f5 57505->57506 57526 5f18d7 GetModuleHandleW GetProcAddress GetProcAddress ReleaseSRWLockExclusive ___delayLoadHelper2@8 57506->57526 57508->57463 57509->57479 57510->57483 57511->57464 57524 5f1648 GetModuleHandleW GetProcAddress GetProcAddress 57512->57524 57514 5f16c3 57515 5f16df 57514->57515 57516 5f16db AcquireSRWLockExclusive 57514->57516 57515->57490 57516->57490 57519 5f1801 ___delayLoadHelper2@8 57517->57519 57518 5f1807 57518->57491 57519->57518 57522 5f183c ___delayLoadHelper2@8 57519->57522 57525 5f16fd VirtualQuery GetSystemInfo 57519->57525 57521 5f1876 VirtualProtect 57521->57518 57522->57521 57523->57495 57524->57514 57525->57522 57526->57499 57527->57037 57528->57042 57529->57044 57531 585438 57530->57531 57532 585447 57530->57532 57531->57532 57533 583620 2 API calls 57531->57533 57532->56678 57534 5854bc 57533->57534 57535->57066 57536->57066 57537->57066 57538->57066 57539->57061 57540->57080 57544 5f46c3 57542->57544 57545 5f46c8 ReleaseSRWLockExclusive 57544->57545 57551 5f46fe SleepConditionVariableSRW 57544->57551 57545->56717 57547->56721 57548->56725 57549->56724 57550->56727 57551->57544 57552->56735 57553->56732 57554 59afd0 CoInitializeEx 57555 59b05a 57554->57555 57556 59b00e 57554->57556 57565 595ab0 57555->57565 57625 598780 306 API calls 4 library calls 57556->57625 57560 59b027 57626 5f3148 56 API calls 57560->57626 57564 59b030 error_info_injector 57570 595ac3 Concurrency::cancel_current_task 57565->57570 57566 595b02 57567 595b29 57566->57567 57627 595560 70 API calls 57566->57627 57569 595b50 57567->57569 57628 595630 70 API calls 57567->57628 57578 595b77 57569->57578 57629 595690 70 API calls 57569->57629 57570->57566 57573 5f6215 CallUnexpected RaiseException 57570->57573 57571 595b1a 57574 5f6215 CallUnexpected RaiseException 57571->57574 57573->57566 57574->57567 57575 595b41 57580 5f6215 CallUnexpected RaiseException 57575->57580 57577 595b9e 57579 595bc5 57577->57579 57631 595750 70 API calls 57577->57631 57578->57577 57630 5956f0 70 API calls 57578->57630 57585 595bec 57579->57585 57632 5957b0 70 API calls 57579->57632 57580->57569 57581 595b68 57586 5f6215 CallUnexpected RaiseException 57581->57586 57583 595b8f 57587 5f6215 CallUnexpected RaiseException 57583->57587 57590 595c13 57585->57590 57633 595810 70 API calls 57585->57633 57586->57578 57587->57577 57588 595bb6 57592 5f6215 CallUnexpected RaiseException 57588->57592 57591 595c3a 57590->57591 57634 595870 70 API calls 57590->57634 57596 595c61 57591->57596 57635 5958d0 70 API calls 57591->57635 57592->57579 57593 595bdd 57597 5f6215 CallUnexpected RaiseException 57593->57597 57602 595c88 57596->57602 57636 595930 70 API calls 57596->57636 57597->57585 57598 595c04 57599 5f6215 CallUnexpected RaiseException 57598->57599 57599->57590 57600 595c2b 57604 5f6215 CallUnexpected RaiseException 57600->57604 57603 595caf 57602->57603 57637 595990 70 API calls 57602->57637 57608 595cd6 57603->57608 57638 5959f0 70 API calls 57603->57638 57604->57591 57605 595c52 57609 5f6215 CallUnexpected RaiseException 57605->57609 57613 595cfd 57608->57613 57639 595a50 70 API calls 57608->57639 57609->57596 57610 595c79 57614 5f6215 CallUnexpected RaiseException 57610->57614 57611 595ca0 57616 5f6215 CallUnexpected RaiseException 57611->57616 57640 595100 70 API calls __purecall 57613->57640 57614->57602 57616->57603 57617 595cc7 57620 5f6215 CallUnexpected RaiseException 57617->57620 57619 595d0f 57622 5f6215 CallUnexpected RaiseException 57619->57622 57620->57608 57621 595cee 57623 5f6215 CallUnexpected RaiseException 57621->57623 57624 595d1e 57622->57624 57623->57613 57625->57560 57626->57564 57627->57571 57628->57575 57629->57581 57630->57583 57631->57588 57632->57593 57633->57598 57634->57600 57635->57605 57636->57610 57637->57611 57638->57617 57639->57621 57640->57619 57641 5bbb30 57642 5bbbaf 57641->57642 57648 5bb780 57642->57648 57663 5c3fd0 57642->57663 57643 5bbbb3 57644 5bbbeb 57643->57644 57645 5bbc05 SetWindowLongW 57643->57645 57645->57644 57649 5bb837 57648->57649 57650 5bb794 57648->57650 57649->57643 57651 5bb79e 57650->57651 57652 5bb7d6 57650->57652 57686 5cca00 57651->57686 57653 5bb80d 57652->57653 57654 5bb7dd 57652->57654 57653->57649 57657 5bb814 DestroyWindow 57653->57657 57654->57649 57656 5bb7e8 EnableWindow 57654->57656 57656->57643 57657->57643 57658 5bb7ad 57691 5bba50 6 API calls 57658->57691 57664 5c4004 57663->57664 57670 5c4142 57663->57670 57665 5c4100 57664->57665 57666 5c4012 57664->57666 57669 5c4112 EndDialog 57665->57669 57665->57670 57667 5cca00 8 API calls 57666->57667 57668 5c4021 57667->57668 57671 5bbea0 18 API calls 57668->57671 57669->57643 57670->57643 57672 5c4029 SetWindowTextW 57671->57672 57673 5839b0 54 API calls 57672->57673 57674 5c403c 57673->57674 57675 5c4189 57674->57675 57676 5c4047 57674->57676 57677 583620 2 API calls 57675->57677 57681 585350 55 API calls 57676->57681 57678 5c4193 57677->57678 57726 5c41c0 57678->57726 57680 5c41a8 error_info_injector 57680->57643 57682 5c4073 GetDlgItem SetWindowTextW 57681->57682 57720 5d4d20 57682->57720 57685 5c40ca 57685->57643 57713 5a98c0 LoadLibraryW 57686->57713 57689 5a98c0 6 API calls 57690 5cca30 SendMessageW SendMessageW 57689->57690 57690->57658 57692 5bbadb SetWindowPos 57691->57692 57693 5bbad4 57691->57693 57694 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57692->57694 57693->57692 57695 5bb7b7 57694->57695 57696 5bbea0 GetWindowLongW 57695->57696 57697 5bbef9 GetParent 57696->57697 57698 5bbf02 GetWindow 57696->57698 57699 5bbf0b GetWindowRect 57697->57699 57698->57699 57700 5bbf89 GetParent GetClientRect GetClientRect MapWindowPoints 57699->57700 57701 5bbf1f 57699->57701 57702 5bbf6a SetWindowPos 57700->57702 57703 5bbf38 MonitorFromWindow 57701->57703 57704 5bbf23 GetWindowLongW 57701->57704 57708 5bbf82 57702->57708 57707 5bbf48 GetMonitorInfoW 57703->57707 57703->57708 57704->57703 57707->57708 57709 5bbf5e 57707->57709 57711 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57708->57711 57709->57702 57710 5bbf75 GetWindowRect 57709->57710 57710->57702 57712 5bb7c0 57711->57712 57712->57643 57714 5a991a GetProcAddress 57713->57714 57715 5a9950 GetSystemMetrics GetSystemMetrics LoadImageW 57713->57715 57714->57715 57717 5a992c 57714->57717 57716 5a994b 57715->57716 57718 5a99a8 FreeLibrary 57716->57718 57719 5a99b6 57716->57719 57717->57715 57717->57716 57718->57719 57719->57689 57721 5d4d30 GetWindowLongW 57720->57721 57722 5d4d4b GetWindow 57721->57722 57723 5d4d42 GetParent 57721->57723 57724 5d4d54 57722->57724 57723->57724 57724->57721 57725 5c4097 CreateThread 57724->57725 57725->57685 57732 5c44a0 CoInitialize 57725->57732 57727 5c4208 CloseHandle 57726->57727 57729 5c420f 57726->57729 57727->57729 57728 5c427a 57728->57680 57729->57728 57731 5f1fd6 10 API calls 57729->57731 57731->57728 57737 5c2c00 57732->57737 57735 5c44f8 57736 5c44f2 CoUninitialize 57736->57735 57744 5c0f80 57737->57744 57743 5c2c65 57743->57735 57743->57736 57759 5c0fc7 std::generic_category 57744->57759 57745 5c10b1 57746 5839b0 54 API calls 57745->57746 57753 5c10b6 57746->57753 57747 5c1a03 57748 583620 2 API calls 57747->57748 57750 5c1a0d 57748->57750 57749 5c19f9 57751 583620 2 API calls 57749->57751 57751->57747 57752 5839b0 54 API calls 57752->57759 57753->57747 57765 5c1121 57753->57765 57810 5b4d90 56 API calls 57753->57810 57755 5c10fa 57756 5c114f 57755->57756 57758 5c111c 57755->57758 57755->57765 57760 585680 46 API calls 57756->57760 57757 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57761 5c186a 57757->57761 57762 586070 46 API calls 57758->57762 57759->57745 57759->57747 57759->57749 57759->57752 57809 5c3550 56 API calls 57759->57809 57760->57765 57761->57743 57801 5c1eb0 57761->57801 57762->57765 57763 5c1820 57763->57757 57765->57747 57765->57749 57765->57763 57767 5839b0 54 API calls 57765->57767 57768 5c1870 57765->57768 57771 5c14b9 CreateFileW 57765->57771 57772 585060 46 API calls 57765->57772 57779 5c13a2 57765->57779 57796 5854d0 46 API calls 57765->57796 57811 599d40 57765->57811 57814 5c37e0 155 API calls 2 library calls 57765->57814 57815 59e160 46 API calls 2 library calls 57765->57815 57817 5a9710 70 API calls 57765->57817 57818 5b5350 46 API calls __Getctype 57765->57818 57767->57765 57768->57763 57769 5839b0 54 API calls 57768->57769 57770 5c187e 57769->57770 57770->57747 57773 5c1888 57770->57773 57775 5c14ff GetFileSize 57771->57775 57776 5c14e9 CloseHandle 57771->57776 57772->57765 57789 585060 46 API calls 57773->57789 57778 5c1519 CloseHandle 57775->57778 57775->57779 57776->57779 57778->57779 57779->57765 57780 5c18f7 57779->57780 57783 5c18f4 57779->57783 57787 585060 46 API calls 57779->57787 57788 5aa750 147 API calls 57779->57788 57816 5cef90 12 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 57779->57816 57782 5c190b DeleteFileW 57780->57782 57780->57783 57785 5c191d 57782->57785 57800 5c18c0 57782->57800 57783->57780 57820 5854d0 46 API calls 4 library calls 57783->57820 57786 5839b0 54 API calls 57785->57786 57790 5c1922 57786->57790 57787->57779 57788->57779 57791 5c18b2 57789->57791 57790->57747 57793 5c192c 57790->57793 57819 5aa750 147 API calls 57791->57819 57797 585060 46 API calls 57793->57797 57796->57765 57798 5c1956 57797->57798 57821 5aa750 147 API calls 57798->57821 57800->57763 57802 5c1ef5 57801->57802 57803 5839b0 54 API calls 57802->57803 57804 5c1efa 57803->57804 57805 583620 2 API calls 57804->57805 57806 5c2301 57805->57806 57807 583620 2 API calls 57806->57807 57808 5c230b 57807->57808 57809->57759 57810->57755 57822 59a4e0 57811->57822 57814->57765 57815->57765 57816->57779 57817->57765 57818->57765 57819->57800 57820->57782 57821->57800 57823 59a518 57822->57823 57824 59a630 57822->57824 57840 5feefb 57823->57840 57825 583620 2 API calls 57824->57825 57839 599d53 57824->57839 57826 59a68e 57825->57826 57827 583620 2 API calls 57826->57827 57829 59a698 57827->57829 57830 5839b0 54 API calls 57832 59a577 57830->57832 57832->57826 57833 59a5cd 57832->57833 57834 59a5bf 57832->57834 57836 585680 46 API calls 57833->57836 57835 585350 55 API calls 57834->57835 57837 59a5cb 57835->57837 57836->57837 57846 5fef3c 57837->57846 57839->57765 57841 5fef0f _Fputc 57840->57841 57852 5fad7d 57841->57852 57847 5fef50 _Fputc 57846->57847 57874 5faf9f 57847->57874 57850 5f95db _Fputc 44 API calls 57851 5fef78 57850->57851 57851->57824 57853 5fadcc 57852->57853 57854 5fada9 57852->57854 57853->57854 57859 5fadd4 57853->57859 57869 5f9822 44 API calls 3 library calls 57854->57869 57856 5fadc1 57857 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57856->57857 57858 5faefe 57857->57858 57863 5f95db 57858->57863 57870 5fd5ad 48 API calls _Fputc 57859->57870 57861 5fae55 57871 5fcaaf 13 API calls ___free_lconv_mon 57861->57871 57864 5f95e7 57863->57864 57866 5f95fe 57864->57866 57872 5f9686 44 API calls 2 library calls 57864->57872 57868 59a538 57866->57868 57873 5f9686 44 API calls 2 library calls 57866->57873 57868->57826 57868->57830 57868->57832 57869->57856 57870->57861 57871->57856 57872->57866 57873->57868 57875 5fafab 57874->57875 57877 5fafce 57874->57877 57882 5f9822 44 API calls 3 library calls 57875->57882 57881 5faff5 57877->57881 57883 5faa86 48 API calls 2 library calls 57877->57883 57880 5fafc6 57880->57850 57881->57880 57884 5f9822 44 API calls 3 library calls 57881->57884 57882->57880 57883->57881 57884->57880 57885 5c4290 GetDlgItem SendMessageW SendMessageW 57886 5cd160 57887 5839b0 54 API calls 57886->57887 57892 5cd20d 57887->57892 57888 5cd3b8 57889 583620 2 API calls 57888->57889 57890 5cd3c2 57889->57890 57905 5cd4c0 IsWindow 57890->57905 57892->57888 57894 5839b0 54 API calls 57892->57894 57893 5cd3d8 error_info_injector 57895 5cd23d 57894->57895 57895->57888 57896 5839b0 54 API calls 57895->57896 57897 5cd2b6 57896->57897 57897->57888 57898 5839b0 54 API calls 57897->57898 57899 5cd33a 57898->57899 57899->57888 57900 5839b0 54 API calls 57899->57900 57901 5cd36c 57900->57901 57901->57888 57902 5cd372 57901->57902 57912 5d4b00 57902->57912 57906 5cd51c EndDialog 57905->57906 57907 5cd527 57905->57907 57906->57907 57921 5cd400 10 API calls 57907->57921 57909 5cd688 57909->57893 57910 5cd5f5 57910->57909 57922 5f1fd6 10 API calls 57910->57922 57923 5aea80 57912->57923 57915 5cd39b 57916 5f46af 3 API calls 57918 5d4b7f __InternalCxxFrameHandler 57916->57918 57917 5d4c58 CoCreateInstance 57917->57915 57920 5d4c0e 57918->57920 57931 5f465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57918->57931 57920->57915 57920->57917 57921->57910 57922->57909 57924 5aeabb 57923->57924 57930 5aeb5f 57923->57930 57925 5f46af 3 API calls 57924->57925 57926 5aeac5 __InternalCxxFrameHandler 57925->57926 57926->57930 57932 5aeb80 57926->57932 57930->57916 57930->57920 57931->57920 57933 5aebd8 RegOpenKeyExW 57932->57933 57935 5aeede 57933->57935 57936 5aec06 RegQueryValueExW RegQueryValueExW 57933->57936 57939 5aef0a 57935->57939 57940 5aeef9 RegCloseKey 57935->57940 57937 5aeccb RegQueryValueExW 57936->57937 57938 5aec6b RegQueryValueExW 57936->57938 57944 5aed12 57937->57944 57938->57937 57942 5aeca3 57938->57942 57941 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57939->57941 57940->57939 57943 5aeb4e 57941->57943 57942->57937 57942->57942 57960 5f465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57943->57960 57945 5aed57 RegQueryValueExW 57944->57945 57946 5aed88 57945->57946 57947 5aedac RegQueryValueExW 57945->57947 57946->57947 57948 5aeddd 57947->57948 57949 5aee96 57948->57949 57950 5f46af 3 API calls 57948->57950 57951 5aeed2 57949->57951 57952 5aeea0 GetCurrentProcess 57949->57952 57953 5aee59 57950->57953 57961 5aef30 57951->57961 57955 5aeec0 IsWow64Process 57952->57955 57953->57949 57954 5aee65 GetModuleHandleW GetProcAddress 57953->57954 57972 5f465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57954->57972 57955->57951 57958 5aeec6 57955->57958 57958->57951 57959 5aee93 57959->57949 57960->57930 57962 5aef8a RegOpenKeyExW 57961->57962 57964 5aefb8 RegQueryValueExW 57962->57964 57971 5af06c 57962->57971 57967 5af037 RegQueryValueExW 57964->57967 57970 5aefe9 57964->57970 57965 5af24e 57968 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57965->57968 57966 5af23d RegCloseKey 57966->57965 57967->57971 57969 5af266 57968->57969 57969->57935 57970->57967 57971->57965 57971->57966 57972->57959 57973 5c0631 58004 5f56f0 57973->58004 57976 5a4890 3 API calls 57977 5c06d9 RegEnumValueA 57976->57977 57978 5839b0 54 API calls 57977->57978 57981 5c0703 57978->57981 57979 5c083d 57980 583620 2 API calls 57979->57980 57993 5c0847 57980->57993 57981->57979 58006 59e8c0 46 API calls 5 library calls 57981->58006 57983 5c0733 57984 5839b0 54 API calls 57983->57984 57985 5c073c 57984->57985 57985->57979 57986 5c0747 57985->57986 57987 58cb10 57 API calls 57986->57987 57988 5c076f 57987->57988 57989 5c077f 57988->57989 58007 59e8c0 46 API calls 5 library calls 57988->58007 58008 5b9b90 57989->58008 57992 5c078e 57994 5b9b90 46 API calls 57992->57994 57995 5c09b5 57993->57995 57996 5c08f0 57993->57996 58003 5c08f8 57993->58003 57999 5c079e 57994->57999 57997 583620 2 API calls 57995->57997 58021 5fff49 44 API calls 57996->58021 58000 5c09bf 57997->58000 58001 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57999->58001 58002 5c0833 58001->58002 58005 5c0652 RegEnumValueA 58004->58005 58005->57976 58006->57983 58007->57989 58009 5b9bd6 58008->58009 58010 5b9c9f 58009->58010 58016 5b9be9 codecvt 58009->58016 58017 5b9c16 __InternalCxxFrameHandler 58009->58017 58025 5855b0 46 API calls 58010->58025 58012 5b9c2f 58022 5f9d3e 13 API calls __Wcrtomb 58012->58022 58013 5b9ca4 58015 5b9c34 58024 5f989f 44 API calls _Ungetc 58015->58024 58016->57992 58017->58012 58017->58016 58018 5b9c66 58017->58018 58018->58016 58023 5f9d3e 13 API calls __Wcrtomb 58018->58023 58021->58003 58022->58015 58023->58015 58024->58016 58025->58013 58026 5c42f1 58029 5c430a 58026->58029 58027 5c4339 58036 5c0d00 230 API calls 58027->58036 58028 5c432a EndDialog 58029->58027 58029->58028 58031 5c433f 58037 5c2df0 46 API calls 58031->58037 58033 5c4347 58034 5c434f EndDialog 58033->58034 58035 5c4361 EndDialog 58033->58035 58034->58035 58036->58031 58037->58033 58038 5f4bd2 58039 5f4bde ___scrt_is_nonwritable_in_current_image 58038->58039 58064 5f4789 58039->58064 58041 5f4be5 58042 5f4d38 58041->58042 58053 5f4c0f ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 58041->58053 58098 5f5342 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter __InternalCxxFrameHandler 58042->58098 58044 5f4d3f 58091 6042bc 58044->58091 58048 5f4d4d 58049 5f4c2e 58050 5f4caf 58075 5f5457 GetStartupInfoW __InternalCxxFrameHandler 58050->58075 58052 5f4cb5 58076 59f680 CoInitialize DefWindowProcW 58052->58076 58053->58049 58053->58050 58094 5ff99b 44 API calls 3 library calls 58053->58094 58058 5f4cd1 58058->58044 58059 5f4cd5 58058->58059 58060 5f4cde 58059->58060 58096 604271 44 API calls __InternalCxxFrameHandler 58059->58096 58097 5f48fa 80 API calls ___scrt_uninitialize_crt 58060->58097 58063 5f4ce6 58063->58049 58065 5f4792 58064->58065 58100 5f4e00 IsProcessorFeaturePresent 58065->58100 58067 5f479e 58101 5f82c8 10 API calls 2 library calls 58067->58101 58069 5f47a3 58070 5f47a7 58069->58070 58102 604cae 58069->58102 58070->58041 58073 5f47be 58073->58041 58075->58052 58111 59f980 58076->58111 58082 59f6f4 58234 59b3e0 58082->58234 58087 59f71b 58089 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58087->58089 58088 59f715 CoUninitialize 58088->58087 58090 59f736 58089->58090 58095 5f548d GetModuleHandleW 58090->58095 59930 6040e5 58091->59930 58094->58050 58095->58058 58096->58060 58097->58063 58098->58044 58099 604280 44 API calls __InternalCxxFrameHandler 58099->58048 58100->58067 58101->58069 58106 60d8b6 58102->58106 58105 5f82e7 7 API calls 2 library calls 58105->58070 58107 5f47b0 58106->58107 58108 60d8c6 58106->58108 58107->58073 58107->58105 58108->58107 58110 607620 VirtualProtect 58108->58110 58110->58108 58112 59f9e5 GetCurrentThreadId 58111->58112 58113 59f9c4 58111->58113 58114 5f43d4 std::_Facet_Register 3 API calls 58112->58114 58113->58112 58115 59f6e0 58114->58115 58116 59b0c0 58115->58116 58253 5b6010 58116->58253 58121 5839b0 54 API calls 58124 59b165 58121->58124 58122 583620 2 API calls 58123 59b28c 58122->58123 58125 5839b0 54 API calls 58124->58125 58132 59b247 58124->58132 58126 59b1a9 58125->58126 58127 5839b0 54 API calls 58126->58127 58126->58132 58128 59b1df 58127->58128 58129 5839b0 54 API calls 58128->58129 58128->58132 58130 59b215 58129->58130 58131 5839b0 54 API calls 58130->58131 58130->58132 58131->58132 58132->58122 58133 59b24d 58132->58133 58134 59b5a0 58133->58134 58386 59c420 GetModuleFileNameW 58134->58386 58136 59b5ea 58137 58c850 46 API calls 58136->58137 58138 59b600 58137->58138 58139 5a6400 77 API calls 58138->58139 58140 59b63b 58139->58140 58141 58c850 46 API calls 58140->58141 58142 59b654 58141->58142 58143 58c850 46 API calls 58142->58143 58144 59b697 58143->58144 58417 59c540 58144->58417 58147 585060 46 API calls 58148 59b6bb 58147->58148 58149 585060 46 API calls 58148->58149 58150 59b6f9 58149->58150 58151 59b71b std::generic_category 58150->58151 58152 59b85b 58150->58152 58153 59b75e CreateFileW 58150->58153 58155 59bcd9 58151->58155 58156 59bccb FindClose 58151->58156 58452 5b3230 58152->58452 58154 59b79d SetFilePointer 58153->58154 58159 59b78c 58153->58159 58154->58159 58160 59b7c2 58154->58160 58161 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58155->58161 58156->58155 58158 59b84e CloseHandle 58158->58152 58159->58152 58159->58158 58432 5a77d0 58160->58432 58165 59bcf6 58161->58165 58165->58082 58166 59b87d 58521 59d680 58166->58521 58167 59b7d1 58169 59b7ec ReadFile 58167->58169 58849 5854d0 46 API calls 4 library calls 58167->58849 58169->58159 58170 59b7ff 58169->58170 58170->58159 58850 5bf480 68 API calls std::generic_category 58170->58850 58171 59b88b 58552 59dae0 58171->58552 58174 59b7e9 58174->58169 58178 59b8a3 58179 59b8dc 58178->58179 58180 586070 46 API calls 58178->58180 58623 5b3b20 58179->58623 58181 59b8b2 58180->58181 58181->58179 58851 5aa540 72 API calls 58181->58851 58183 59b91d 58185 59b942 GetModuleFileNameW 58183->58185 58186 59b935 58183->58186 58188 59b9b9 58185->58188 58189 59b95e 58185->58189 58187 58c850 46 API calls 58186->58187 58190 59b940 58187->58190 58194 59ba08 58188->58194 58195 59baaa 58188->58195 58212 59ba73 58188->58212 58191 59b96b 58189->58191 58192 59bcfe 58189->58192 58199 5a6400 77 API calls 58190->58199 58203 585680 46 API calls 58191->58203 58854 5f4556 5 API calls std::_Locinfo::_Locinfo_dtor 58192->58854 58852 5b1f80 164 API calls __Getcoll 58194->58852 58853 5b4f30 109 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 58195->58853 58196 58c850 46 API calls 58198 59bb0c 58196->58198 58635 5ba550 58198->58635 58204 59b9a9 58199->58204 58201 59ba18 58207 58c850 46 API calls 58201->58207 58203->58190 58209 58c850 46 API calls 58204->58209 58205 59bab9 58210 58c850 46 API calls 58205->58210 58206 59bd03 std::generic_category 58206->58082 58216 59ba2b 58207->58216 58209->58188 58210->58212 58211 58c850 46 API calls 58213 59bb4b 58211->58213 58212->58196 58214 58c850 46 API calls 58213->58214 58215 59bb57 58214->58215 58646 5af8e0 58215->58646 58218 58c850 46 API calls 58216->58218 58218->58212 59790 59dd10 58234->59790 58237 5baa70 143 API calls 58238 59b518 58237->58238 58239 59e820 44 API calls 58238->58239 58240 59b55a std::generic_category 58239->58240 59826 59b290 58240->59826 58244 59b587 58245 59f7f0 EnterCriticalSection 58244->58245 58246 59f88b LeaveCriticalSection 58245->58246 58247 59f843 58245->58247 58252 59f8b1 error_info_injector 58246->58252 58248 59f849 DestroyWindow 58247->58248 58250 59f859 error_info_injector 58247->58250 58248->58250 58250->58246 59923 59fb00 58252->59923 58254 5839b0 54 API calls 58253->58254 58258 5b60cb 58254->58258 58255 5b651f 58256 583620 2 API calls 58255->58256 58257 5b6529 58256->58257 58258->58255 58259 5839b0 54 API calls 58258->58259 58260 5b6100 58259->58260 58260->58255 58261 5839b0 54 API calls 58260->58261 58262 5b6132 58261->58262 58262->58255 58263 5839b0 54 API calls 58262->58263 58264 5b6164 58263->58264 58264->58255 58265 5839b0 54 API calls 58264->58265 58266 5b6196 58265->58266 58266->58255 58267 5839b0 54 API calls 58266->58267 58268 5b61c8 58267->58268 58268->58255 58269 5839b0 54 API calls 58268->58269 58270 5b62b8 58269->58270 58270->58255 58271 5839b0 54 API calls 58270->58271 58272 5b62f7 58271->58272 58272->58255 58273 5839b0 54 API calls 58272->58273 58274 5b634d 58273->58274 58274->58255 58275 5839b0 54 API calls 58274->58275 58276 5b638c 58275->58276 58276->58255 58277 5839b0 54 API calls 58276->58277 58278 5b6423 58277->58278 58278->58255 58279 5b642e 58278->58279 58310 584450 58279->58310 58282 5869b0 47 API calls 58283 5b6464 58282->58283 58283->58283 58284 585680 46 API calls 58283->58284 58285 5b649e 58284->58285 58368 58c850 58285->58368 58287 5b64a7 58288 5843b0 44 API calls 58287->58288 58289 5b64b3 58288->58289 58290 5843b0 44 API calls 58289->58290 58291 5b64bf 58290->58291 58292 585400 2 API calls 58291->58292 58293 5b64da 58292->58293 58294 585060 46 API calls 58293->58294 58295 5b64e9 58294->58295 58296 585060 46 API calls 58295->58296 58297 5b64fb 58296->58297 58298 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58297->58298 58299 59b101 58298->58299 58300 5ba3e0 58299->58300 58301 5839b0 54 API calls 58300->58301 58305 5ba415 58301->58305 58302 5ba477 58303 583620 2 API calls 58302->58303 58309 59b113 58302->58309 58304 5ba544 58303->58304 58305->58302 58306 5839b0 54 API calls 58305->58306 58307 5ba447 58306->58307 58307->58302 58308 5839b0 54 API calls 58307->58308 58308->58302 58309->58121 58311 5844be 58310->58311 58328 5844f6 58310->58328 58312 5f46af 3 API calls 58311->58312 58317 5844c8 58312->58317 58313 5a4710 19 API calls 58315 58450b 58313->58315 58314 582040 46 API calls 58316 584743 58314->58316 58318 584513 58315->58318 58319 584656 GetTempPathW 58315->58319 58320 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58316->58320 58317->58328 58377 5f494f 47 API calls 58317->58377 58322 58456a 58318->58322 58325 5f46af 3 API calls 58318->58325 58332 58466a 58319->58332 58323 58476d 58320->58323 58326 58458e GetWindowsDirectoryW 58322->58326 58331 58457a PathFileExistsW 58322->58331 58323->58282 58324 5844e5 58378 5f465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 58324->58378 58330 58452a 58325->58330 58380 5f9b95 44 API calls 2 library calls 58326->58380 58328->58313 58343 584710 error_info_injector 58328->58343 58330->58322 58333 584536 GetModuleHandleW GetProcAddress 58330->58333 58331->58332 58337 5845ca 58331->58337 58335 583c00 46 API calls 58332->58335 58332->58343 58379 5f465e AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 58333->58379 58338 5846c2 58335->58338 58381 5a4b10 15 API calls 58337->58381 58340 586bc0 47 API calls 58338->58340 58339 584567 58339->58322 58341 5846da 58340->58341 58341->58343 58346 584774 58341->58346 58343->58314 58344 5845ef 58382 5a4b10 15 API calls 58344->58382 58385 5f98af 44 API calls 2 library calls 58346->58385 58348 584602 58383 5a5090 8 API calls 58348->58383 58351 58460d 58353 584611 CreateDirectoryW 58351->58353 58354 584645 58351->58354 58353->58354 58384 5a49c0 RtlAllocateHeap LocalFree LocalFree LocalFree RaiseException 58354->58384 58357 584654 58357->58332 58369 58c8bf 58368->58369 58370 58c866 58368->58370 58369->58287 58371 58c8ac 58370->58371 58372 58c876 58370->58372 58373 585680 46 API calls 58371->58373 58374 586070 46 API calls 58372->58374 58375 58c8b7 58373->58375 58376 58c87c 58374->58376 58375->58287 58376->58287 58377->58324 58378->58328 58379->58339 58380->58331 58381->58344 58382->58348 58383->58351 58384->58357 58387 59c527 58386->58387 58388 59c487 58386->58388 58855 5f4556 5 API calls std::_Locinfo::_Locinfo_dtor 58387->58855 58389 5839b0 54 API calls 58388->58389 58391 59c493 58389->58391 58392 59c52c 58391->58392 58393 59c49d 58391->58393 58394 583620 2 API calls 58392->58394 58398 59c4d1 58393->58398 58399 59c4c4 58393->58399 58395 59c536 58394->58395 58396 5839b0 54 API calls 58395->58396 58397 59c57b 58396->58397 58400 59c693 58397->58400 58401 59c585 58397->58401 58406 585680 46 API calls 58398->58406 58402 585350 55 API calls 58399->58402 58403 583620 2 API calls 58400->58403 58408 59c420 66 API calls 58401->58408 58404 59c4cf 58402->58404 58405 59c69d 58403->58405 58407 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58404->58407 58406->58404 58409 59c51d 58407->58409 58410 59c5b5 58408->58410 58409->58136 58411 59e310 65 API calls 58410->58411 58412 59c5fd 58410->58412 58414 59c5f1 58411->58414 58413 59c652 58412->58413 58856 59e730 46 API calls 3 library calls 58412->58856 58413->58136 58415 58c850 46 API calls 58414->58415 58415->58412 58418 5839b0 54 API calls 58417->58418 58419 59c57b 58418->58419 58420 59c693 58419->58420 58421 59c585 58419->58421 58422 583620 2 API calls 58420->58422 58424 59c420 67 API calls 58421->58424 58423 59c69d 58422->58423 58425 59c5b5 58424->58425 58426 59e310 65 API calls 58425->58426 58427 59c5fd 58425->58427 58429 59c5f1 58426->58429 58428 59b6a7 58427->58428 58857 59e730 46 API calls 3 library calls 58427->58857 58428->58147 58430 58c850 46 API calls 58429->58430 58430->58427 58433 5839b0 54 API calls 58432->58433 58443 5a780e 58433->58443 58434 5a7993 58435 583620 2 API calls 58434->58435 58436 5a799d 58435->58436 58437 583620 2 API calls 58436->58437 58438 5a79a7 58437->58438 58439 5a79e7 58438->58439 58440 5a79db Wow64RevertWow64FsRedirection 58438->58440 58439->58167 58440->58439 58441 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58442 5a7983 58441->58442 58442->58167 58443->58434 58443->58443 58444 5a7989 58443->58444 58446 5a7897 58443->58446 58451 5a7941 58443->58451 58445 583620 2 API calls 58444->58445 58445->58434 58449 5a78a5 58446->58449 58858 5a09f0 RtlAllocateHeap RaiseException ___std_exception_copy 58446->58858 58859 5f9d53 44 API calls 3 library calls 58449->58859 58450 5a78bd 58450->58436 58450->58451 58451->58441 58860 5b3430 58452->58860 58455 5839b0 54 API calls 58458 5b3296 58455->58458 58456 583620 2 API calls 58457 5b3427 58456->58457 58459 5839b0 54 API calls 58458->58459 58470 5b33d2 58458->58470 58460 5b32d1 58459->58460 58461 5839b0 54 API calls 58460->58461 58460->58470 58462 5b3301 58461->58462 58463 5839b0 54 API calls 58462->58463 58462->58470 58464 5b3334 58463->58464 58465 5839b0 54 API calls 58464->58465 58464->58470 58466 5b336a 58465->58466 58467 5839b0 54 API calls 58466->58467 58466->58470 58468 5b33a0 58467->58468 58469 5839b0 54 API calls 58468->58469 58468->58470 58469->58470 58470->58456 58471 59b86a 58470->58471 58472 5b3d70 58471->58472 58904 5bc1c0 66 API calls std::_Locinfo::_Locinfo_dtor 58472->58904 58476 5b3f9f 58479 583620 2 API calls 58476->58479 58478 5b3f67 std::generic_category 58478->58166 58480 5b3fa9 58479->58480 58483 5839b0 54 API calls 58480->58483 58481 585060 46 API calls 58489 5b3db0 std::generic_category 58481->58489 58490 5b3fe5 58483->58490 58484 585680 46 API calls 58484->58489 58485 5b42d2 58487 583620 2 API calls 58485->58487 58520 5b42d8 58485->58520 58486 586070 46 API calls 58486->58489 58488 5b4316 58487->58488 58489->58476 58489->58478 58489->58481 58489->58484 58489->58486 58905 5b3fb0 56 API calls 58489->58905 58906 5bd4a0 68 API calls 58489->58906 58907 5b1f80 164 API calls __Getcoll 58489->58907 58908 5b5070 46 API calls __Getctype 58489->58908 58490->58485 58491 5839b0 54 API calls 58490->58491 58492 5b4017 58491->58492 58492->58485 58493 5839b0 54 API calls 58492->58493 58494 5b4047 58493->58494 58494->58485 58495 5839b0 54 API calls 58494->58495 58496 5b4077 58495->58496 58496->58485 58497 5839b0 54 API calls 58496->58497 58498 5b40a7 58497->58498 58498->58485 58499 5839b0 54 API calls 58498->58499 58500 5b40d7 58499->58500 58500->58485 58501 5839b0 54 API calls 58500->58501 58502 5b4107 58501->58502 58502->58485 58503 5839b0 54 API calls 58502->58503 58504 5b4137 58503->58504 58504->58485 58505 5839b0 54 API calls 58504->58505 58506 5b4167 58505->58506 58506->58485 58507 5839b0 54 API calls 58506->58507 58508 5b4197 58507->58508 58508->58485 58509 5839b0 54 API calls 58508->58509 58510 5b41c7 58509->58510 58510->58485 58511 5839b0 54 API calls 58510->58511 58512 5b41f7 58511->58512 58512->58485 58513 5839b0 54 API calls 58512->58513 58514 5b4227 58513->58514 58514->58485 58515 5839b0 54 API calls 58514->58515 58516 5b4273 58515->58516 58516->58485 58517 5839b0 54 API calls 58516->58517 58518 5b42a4 58517->58518 58518->58485 58519 5839b0 54 API calls 58518->58519 58519->58485 58520->58166 58522 59dae0 56 API calls 58521->58522 58523 59d6b5 58522->58523 58524 5be940 65 API calls 58523->58524 58525 59d6c8 58524->58525 58526 58c850 46 API calls 58525->58526 58527 59da5b 58525->58527 58528 59d6e8 58526->58528 58527->58171 58909 5ba870 58528->58909 58530 59d704 58531 58c850 46 API calls 58530->58531 58543 59d718 58531->58543 58532 59d8fc 58923 59e160 46 API calls 2 library calls 58532->58923 58535 59d90e 58536 5ba870 47 API calls 58535->58536 58538 59d920 58536->58538 58537 58c850 46 API calls 58537->58543 58538->58527 58542 5a6400 77 API calls 58538->58542 58539 585680 46 API calls 58539->58543 58540 586070 46 API calls 58540->58543 58551 59d95f 58542->58551 58543->58532 58543->58537 58543->58539 58543->58540 58919 5a6b60 58543->58919 58922 59e160 46 API calls 2 library calls 58543->58922 58544 59dad5 58545 583620 2 API calls 58544->58545 58546 59dadf 58545->58546 58547 5ba870 47 API calls 58547->58551 58548 5a6400 77 API calls 58548->58551 58549 585680 46 API calls 58549->58551 58550 586070 46 API calls 58550->58551 58551->58527 58551->58544 58551->58547 58551->58548 58551->58549 58551->58550 58553 5839b0 54 API calls 58552->58553 58557 59db15 58553->58557 58554 59dba3 58555 583620 2 API calls 58554->58555 58563 59b893 58554->58563 58556 59dbe5 58555->58556 58557->58554 58558 5839b0 54 API calls 58557->58558 58559 59db47 58558->58559 58559->58554 58560 5839b0 54 API calls 58559->58560 58561 59db77 58560->58561 58561->58554 58562 5839b0 54 API calls 58561->58562 58562->58554 58564 5be940 58563->58564 58565 5839b0 54 API calls 58564->58565 58569 5be96f 58565->58569 58566 5bece7 58567 583620 2 API calls 58566->58567 58568 5becf1 58567->58568 58569->58566 58570 5be9b1 58569->58570 58571 5be9a6 58569->58571 58573 585680 46 API calls 58570->58573 58572 585350 55 API calls 58571->58572 58574 5be9af 58572->58574 58573->58574 58938 5bf840 46 API calls 58574->58938 58576 5be9cf 58577 5bea06 58576->58577 58578 5839b0 54 API calls 58576->58578 58577->58178 58579 5bea21 58578->58579 58579->58566 58580 5bea58 58579->58580 58581 5bea63 58579->58581 58583 585350 55 API calls 58580->58583 58582 585680 46 API calls 58581->58582 58584 5bea61 58582->58584 58583->58584 58939 5bf370 RtlAllocateHeap RaiseException error_info_injector std::generic_category 58584->58939 58586 5bea81 58587 5beacc 58586->58587 58588 58c850 46 API calls 58586->58588 58589 5839b0 54 API calls 58587->58589 58588->58587 58590 5bead1 58589->58590 58590->58566 58591 5beb0a 58590->58591 58592 5beb15 58590->58592 58593 585350 55 API calls 58591->58593 58594 585680 46 API calls 58592->58594 58595 5beb13 58593->58595 58594->58595 58940 5bf370 RtlAllocateHeap RaiseException error_info_injector std::generic_category 58595->58940 58597 5beb34 58598 5beb7a 58597->58598 58599 58c850 46 API calls 58597->58599 58600 5839b0 54 API calls 58598->58600 58599->58598 58601 5beb7f 58600->58601 58601->58566 58602 5bebb8 58601->58602 58603 5bebc3 58601->58603 58605 585350 55 API calls 58602->58605 58604 585680 46 API calls 58603->58604 58606 5bebc1 58604->58606 58605->58606 58941 5bf370 RtlAllocateHeap RaiseException error_info_injector std::generic_category 58606->58941 58608 5bebe2 58609 5bec28 58608->58609 58610 58c850 46 API calls 58608->58610 58611 5839b0 54 API calls 58609->58611 58610->58609 58612 5bec2d 58611->58612 58612->58566 58613 5bec38 58612->58613 58614 5bec71 58613->58614 58615 5bec66 58613->58615 58617 585680 46 API calls 58614->58617 58616 585350 55 API calls 58615->58616 58618 5bec6f 58616->58618 58617->58618 58624 5839b0 54 API calls 58623->58624 58625 5b3b4d 58624->58625 58626 5b3c19 58625->58626 58627 5b3b57 58625->58627 58628 583620 2 API calls 58626->58628 58630 5b3b8f 58627->58630 58631 5b3b84 58627->58631 58629 5b3c23 58628->58629 58943 5a6150 58630->58943 58632 585350 55 API calls 58631->58632 58634 5b3b8d 58632->58634 58634->58183 58636 5839b0 54 API calls 58635->58636 58637 5ba57d 58636->58637 58638 5ba5fd 58637->58638 58639 5ba583 58637->58639 58640 583620 2 API calls 58638->58640 58642 585350 55 API calls 58639->58642 58641 5ba607 58640->58641 58643 5ba5ac 58642->58643 58954 5ba610 58643->58954 58645 59bb3d 58645->58211 58647 586070 46 API calls 58646->58647 58849->58174 58850->58159 58851->58179 58852->58201 58853->58205 58854->58206 58855->58392 58856->58413 58857->58428 58858->58449 58859->58450 58861 5839b0 54 API calls 58860->58861 58864 5b3465 58861->58864 58862 583620 2 API calls 58863 5b3835 58862->58863 58865 5839b0 54 API calls 58864->58865 58902 5b37f3 58864->58902 58866 5b3497 58865->58866 58867 5839b0 54 API calls 58866->58867 58866->58902 58868 5b34c7 58867->58868 58869 5839b0 54 API calls 58868->58869 58868->58902 58870 5b34f7 58869->58870 58871 5839b0 54 API calls 58870->58871 58870->58902 58872 5b3527 58871->58872 58873 5839b0 54 API calls 58872->58873 58872->58902 58874 5b3557 58873->58874 58875 5839b0 54 API calls 58874->58875 58874->58902 58876 5b3587 58875->58876 58877 5839b0 54 API calls 58876->58877 58876->58902 58878 5b35b7 58877->58878 58879 5839b0 54 API calls 58878->58879 58878->58902 58880 5b35e7 58879->58880 58881 5839b0 54 API calls 58880->58881 58880->58902 58882 5b3617 58881->58882 58883 5839b0 54 API calls 58882->58883 58882->58902 58884 5b3647 58883->58884 58885 5839b0 54 API calls 58884->58885 58884->58902 58886 5b3677 58885->58886 58887 5839b0 54 API calls 58886->58887 58886->58902 58888 5b36a7 58887->58888 58889 5839b0 54 API calls 58888->58889 58888->58902 58890 5b36d7 58889->58890 58891 5839b0 54 API calls 58890->58891 58890->58902 58892 5b3707 58891->58892 58893 5839b0 54 API calls 58892->58893 58892->58902 58894 5b3737 58893->58894 58895 5839b0 54 API calls 58894->58895 58894->58902 58896 5b3767 58895->58896 58897 5839b0 54 API calls 58896->58897 58896->58902 58898 5b3797 58897->58898 58899 5839b0 54 API calls 58898->58899 58898->58902 58900 5b37c7 58899->58900 58901 5839b0 54 API calls 58900->58901 58900->58902 58901->58902 58902->58862 58903 5b3287 58902->58903 58903->58455 58904->58489 58905->58489 58906->58489 58907->58489 58908->58489 58910 5ba8be 58909->58910 58917 5ba8a4 58909->58917 58911 5ba90c 58910->58911 58912 5ba8cd 58910->58912 58913 5ba901 58910->58913 58911->58530 58915 586070 46 API calls 58912->58915 58925 5bb4e0 46 API calls 4 library calls 58913->58925 58918 5ba8dd 58915->58918 58917->58910 58924 600534 45 API calls 2 library calls 58917->58924 58918->58530 58926 5a6ba0 58919->58926 58922->58543 58923->58535 58924->58917 58925->58911 58927 5a6be6 58926->58927 58937 5a6bdc 58926->58937 58928 5a6cd5 58927->58928 58933 5a6c06 __InternalCxxFrameHandler 58927->58933 58927->58937 58931 583620 2 API calls 58928->58931 58929 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58930 5a6b88 58929->58930 58930->58543 58932 5a6cdf 58931->58932 58934 5a6c82 GetLastError 58933->58934 58935 5a6c65 58933->58935 58933->58937 58934->58935 58936 5a6c9f FindClose 58935->58936 58935->58937 58936->58937 58937->58929 58938->58576 58939->58586 58940->58597 58941->58608 58944 5a61ba 58943->58944 58945 5a615d MultiByteToWideChar 58943->58945 58947 585400 2 API calls 58944->58947 58945->58944 58946 5a6175 58945->58946 58948 5a6190 MultiByteToWideChar 58946->58948 58949 5a61c1 58947->58949 58950 5a61c9 58948->58950 58951 5a61a7 58948->58951 58949->58634 58952 583620 2 API calls 58950->58952 58951->58634 58953 5a61d3 58952->58953 58955 5ba7be 58954->58955 58956 5ba647 GetActiveWindow 58954->58956 58955->58645 58957 5ba66f 58956->58957 58958 5ba663 58956->58958 58960 5ba692 58957->58960 58993 5f1f2a GetProcessHeap HeapAlloc 58957->58993 58959 5bba50 12 API calls 58958->58959 58962 5ba66a KiUserCallbackDispatcher 58959->58962 58986 5f202c 58960->58986 58962->58957 58965 5ba67e 58965->58960 58966 5ba685 SetLastError 58965->58966 58969 5ba712 GetCurrentThreadId 58966->58969 58967 5ba7d2 59003 59fae0 RaiseException 58967->59003 58968 5ba6a7 GetCurrentThreadId EnterCriticalSection LeaveCriticalSection CreateDialogParamW 58968->58969 58987 5f2037 58986->58987 58992 5ba69c 58986->58992 58988 5f2043 58987->58988 58989 5f2050 58987->58989 58987->58992 59068 5f1d93 GetCurrentProcess FlushInstructionCache 58988->59068 59069 5f1cbc 58989->59069 58992->58967 58992->58968 58994 5f1f46 58993->58994 58995 5f1f42 58993->58995 58996 5f1cbc 5 API calls 58994->58996 58995->58965 58997 5f1f51 58996->58997 58998 5f1f6d 58997->58998 59000 5f1f61 58997->59000 59087 5f1dc8 15 API calls __InternalCxxFrameHandler 58998->59087 59001 5f1f8b 59000->59001 59001->58965 59068->58992 59087->59000 59791 59ddfb 59790->59791 59820 59dd63 59790->59820 59795 59e018 59791->59795 59796 59de36 59791->59796 59825 59dea2 __InternalCxxFrameHandler 59791->59825 59792 59e01d 59793 583620 2 API calls 59792->59793 59799 59e027 59793->59799 59794 59dfd6 59801 59e820 44 API calls 59794->59801 59868 583430 45 API calls 59795->59868 59800 59de41 59796->59800 59804 59de4d 59796->59804 59805 59de76 59796->59805 59797 59dd77 DeleteFileW 59797->59792 59797->59820 59869 5842d0 RaiseException std::_Facet_Register CallUnexpected 59799->59869 59865 5bb6d0 46 API calls 59800->59865 59806 59dff3 59801->59806 59803 586070 46 API calls 59803->59825 59804->59799 59811 59de58 59804->59811 59808 5f43d4 std::_Facet_Register 3 API calls 59805->59808 59812 5f43af __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 59806->59812 59807 5a6400 77 API calls 59807->59820 59808->59800 59809 59e02c 59870 5f98af 44 API calls 2 library calls 59809->59870 59813 5f43d4 std::_Facet_Register 3 API calls 59811->59813 59814 59b419 59812->59814 59818 59de5e 59813->59818 59814->58237 59817 585060 46 API calls 59817->59825 59818->59800 59818->59809 59820->59791 59820->59792 59820->59797 59820->59807 59845 5a69c0 59820->59845 59821 59df9b PathIsDirectoryW 59821->59825 59823 59df60 FindClose 59823->59821 59823->59825 59825->59794 59825->59803 59825->59817 59825->59821 59825->59823 59866 59e270 RtlAllocateHeap RaiseException 59825->59866 59867 5bb350 46 API calls 59825->59867 59827 59b2cb 59826->59827 59828 5bb9e0 4 API calls 59827->59828 59829 59b307 59828->59829 59831 59b322 59829->59831 59893 5f1fd6 10 API calls 59829->59893 59832 5b6530 59831->59832 59833 5b65ae std::generic_category 59832->59833 59834 5b6582 59832->59834 59894 5b68d0 59833->59894 59835 5b68ba 59834->59835 59837 5b6596 DeleteFileW 59834->59837 59836 583620 2 API calls 59835->59836 59839 5b68c4 59836->59839 59837->59833 59837->59834 59840 5b65c0 59912 5b9930 59840->59912 59842 5b660b std::generic_category 59843 5b6743 CloseHandle 59842->59843 59844 5b6754 59842->59844 59843->59844 59844->58244 59846 5839b0 54 API calls 59845->59846 59850 5a69f5 59846->59850 59847 5a6b52 59848 583620 2 API calls 59847->59848 59849 5a6b5c 59848->59849 59850->59847 59851 5a6b48 59850->59851 59852 5a6a38 59850->59852 59853 583620 2 API calls 59851->59853 59854 5a6a88 59852->59854 59855 5a6a42 59852->59855 59853->59847 59856 58c850 46 API calls 59854->59856 59857 5a4320 56 API calls 59855->59857 59861 5a6a59 59856->59861 59858 5a6a4c 59857->59858 59860 58c850 46 API calls 59858->59860 59859 5a6ae1 59859->59820 59860->59861 59861->59859 59871 5a4320 59861->59871 59863 5a6ac2 59863->59859 59864 5a69c0 56 API calls 59863->59864 59864->59859 59865->59825 59866->59825 59867->59825 59872 5a4363 59871->59872 59873 5a4397 59871->59873 59874 586070 46 API calls 59872->59874 59876 5839b0 54 API calls 59873->59876 59884 5a43b8 59873->59884 59875 5a436b 59874->59875 59875->59863 59876->59884 59877 5a44aa 59879 583620 2 API calls 59877->59879 59878 5a449b 59880 583620 2 API calls 59878->59880 59881 5a44b4 59879->59881 59882 5a44a5 59880->59882 59892 5855b0 46 API calls 59882->59892 59884->59877 59884->59878 59884->59882 59887 5a442e __InternalCxxFrameHandler 59884->59887 59886 5a444a codecvt 59886->59863 59887->59886 59890 5f9d3e 13 API calls __Wcrtomb 59887->59890 59888 5a446c 59891 5f989f 44 API calls _Ungetc 59888->59891 59890->59888 59891->59886 59892->59877 59893->59831 59902 5b690a 59894->59902 59911 5b6a82 std::generic_category 59894->59911 59895 5b6a49 59920 5b99f0 46 API calls 5 library calls 59895->59920 59897 5b6942 59898 5b6ad0 59897->59898 59899 5b69a1 DeleteFileW GetLastError 59897->59899 59905 5b69e8 59897->59905 59900 583620 2 API calls 59898->59900 59903 5b69c5 59899->59903 59904 5b6ada 59900->59904 59901 5b6a09 RemoveDirectoryW GetLastError 59901->59905 59902->59897 59902->59911 59917 5b6ae0 82 API calls 59902->59917 59903->59897 59903->59898 59903->59905 59918 59e160 46 API calls 2 library calls 59903->59918 59905->59895 59905->59898 59905->59901 59919 59e160 46 API calls 2 library calls 59905->59919 59908 5b6a55 std::generic_category 59908->59898 59908->59911 59921 59e160 46 API calls 2 library calls 59908->59921 59911->59840 59913 5b99ae error_info_injector 59912->59913 59914 5b9963 59912->59914 59913->59842 59914->59913 59922 5f98af 44 API calls 2 library calls 59914->59922 59917->59897 59918->59903 59919->59905 59920->59908 59921->59908 59924 59f708 59923->59924 59926 59fb31 59923->59926 59924->58087 59924->58088 59925 59fb9e DeleteCriticalSection 59925->59924 59926->59923 59928 59fb47 error_info_injector 59926->59928 59929 59fae0 RaiseException 59926->59929 59928->59925 59929->59926 59931 604112 59930->59931 59932 604124 59930->59932 59961 5f548d GetModuleHandleW 59931->59961 59944 603fad 59932->59944 59936 604117 59936->59932 59962 6041d1 GetModuleHandleExW 59936->59962 59937 5f4d45 59937->58099 59941 604166 __InternalCxxFrameHandler 59941->59937 59956 6041a3 59941->59956 59945 603fb9 ___scrt_is_nonwritable_in_current_image 59944->59945 59968 602301 EnterCriticalSection 59945->59968 59947 603fc3 59969 603ffd 59947->59969 59949 603fd0 59973 603fee 59949->59973 59952 609853 59953 609862 __InternalCxxFrameHandler 59952->59953 59954 60986f 59953->59954 59978 60723d 59953->59978 59954->59941 59957 6041be 59956->59957 59958 6041ae GetCurrentProcess TerminateProcess 59956->59958 59959 6041d1 __InternalCxxFrameHandler 3 API calls 59957->59959 59958->59957 59960 6041c6 ExitProcess 59959->59960 59961->59936 59963 604210 GetProcAddress 59962->59963 59964 604231 59962->59964 59963->59964 59967 604224 59963->59967 59965 604123 59964->59965 59966 604237 FreeLibrary 59964->59966 59965->59932 59966->59965 59967->59964 59968->59947 59971 604009 ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler 59969->59971 59972 60406d __InternalCxxFrameHandler 59971->59972 59976 604aef 13 API calls 3 library calls 59971->59976 59972->59949 59977 602351 LeaveCriticalSection 59973->59977 59975 603fdc 59975->59937 59975->59952 59976->59972 59977->59975 59979 60724e 59978->59979 59981 607268 59978->59981 59980 60710d std::_Locinfo::_Locinfo_dtor 44 API calls 59979->59980 59979->59981 59980->59981 59981->59954

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1272 59b5a0-59b61a call 59c420 call 58c850 1277 59b61c-59b62c 1272->1277 1278 59b630-59b66b call 5a6400 call 58c850 1272->1278 1277->1278 1284 59b66d-59b67d 1278->1284 1285 59b681-59b6d2 call 58c850 call 5a61e0 call 59c540 call 585060 1278->1285 1284->1285 1295 59b6eb-59b719 call 585060 1285->1295 1296 59b6d4-59b6e8 1285->1296 1302 59b71b-59b71d 1295->1302 1303 59b722-59b758 1295->1303 1296->1295 1304 59bcb9-59bcc9 1302->1304 1305 59b85e-59b8a5 call 5b3230 call 5b3d70 call 59d680 call 59dae0 call 5be940 1303->1305 1306 59b75e-59b78a CreateFileW 1303->1306 1309 59bcd9-59bcfd call 5f43af 1304->1309 1310 59bccb-59bcd2 FindClose 1304->1310 1341 59b8a7-59b8c5 call 586070 1305->1341 1342 59b906-59b933 call 59dbf0 call 5b3b20 1305->1342 1307 59b79d-59b7c0 SetFilePointer 1306->1307 1308 59b78c-59b798 1306->1308 1313 59b83e-59b84b 1307->1313 1314 59b7c2-59b7dc call 5a77d0 1307->1314 1312 59b84e-59b854 CloseHandle 1308->1312 1310->1309 1318 59b85b 1312->1318 1313->1318 1319 59b84d 1313->1319 1325 59b7ec-59b7fd ReadFile 1314->1325 1326 59b7de-59b7e9 call 5854d0 1314->1326 1318->1305 1319->1312 1327 59b7ff-59b803 1325->1327 1328 59b813-59b828 1325->1328 1326->1325 1327->1328 1331 59b805-59b811 call 5bf480 1327->1331 1328->1313 1333 59b82a-59b83a 1328->1333 1331->1328 1333->1313 1348 59b8df-59b8ed 1341->1348 1349 59b8c7-59b8dc call 5aa540 1341->1349 1353 59b942-59b958 GetModuleFileNameW 1342->1353 1354 59b935-59b940 call 58c850 1342->1354 1348->1342 1352 59b8ef-59b903 1348->1352 1349->1348 1352->1342 1358 59b9eb-59b9f2 1353->1358 1359 59b95e-59b965 1353->1359 1366 59b99f-59b9cd call 5a6400 call 58c850 1354->1366 1361 59b9f8-59ba02 1358->1361 1362 59bafa-59bb96 call 58c850 call 5ba550 call 58c850 * 2 call 5af8e0 call 5a9b20 call 599d40 1358->1362 1363 59b96b-59b97e 1359->1363 1364 59bcfe-59bd5f call 5f4556 call 59eb90 1359->1364 1368 59ba08-59ba3f call 5b1f80 call 58c850 1361->1368 1369 59baaa-59badd call 5b4f30 call 58c850 1361->1369 1422 59bb98-59bba8 1362->1422 1423 59bbac-59bbd5 call 5a6400 SetCurrentDirectoryW 1362->1423 1371 59b981-59b98a 1363->1371 1397 59b9cf-59b9df 1366->1397 1398 59b9e3-59b9e6 call 5a61e0 1366->1398 1394 59ba41-59ba51 1368->1394 1395 59ba55-59ba87 call 5a6250 call 58c850 1368->1395 1399 59badf-59baef 1369->1399 1400 59baf3 1369->1400 1371->1371 1374 59b98c-59b99a call 585680 1371->1374 1374->1366 1394->1395 1414 59ba89-59ba99 1395->1414 1415 59ba9d-59baa8 call 5a61e0 1395->1415 1397->1398 1398->1358 1399->1400 1400->1362 1414->1415 1415->1400 1422->1423 1427 59bbeb-59bc0f OpenMutexW 1423->1427 1428 59bbd7-59bbe7 1423->1428 1429 59bc11-59bc1a GetLastError 1427->1429 1430 59bc36-59bc41 WaitForSingleObject 1427->1430 1428->1427 1432 59bc29-59bc34 1429->1432 1433 59bc1c-59bc27 1429->1433 1434 59bc73-59bc85 CloseHandle 1430->1434 1435 59bc43-59bc55 CloseHandle 1430->1435 1436 59bc8c 1432->1436 1437 59bc5c-59bc68 call 59cb20 1433->1437 1434->1436 1435->1437 1438 59bc91-59bcb6 call 59bdb0 call 59eb90 1436->1438 1440 59bc6d-59bc71 1437->1440 1438->1304 1440->1438
                                                                                  APIs
                                                                                    • Part of subcall function 0059C420: GetModuleFileNameW.KERNEL32(00000000,?,00000104,5D2E80A5,00000000,?,?,006198E6,000000FF), ref: 0059C474
                                                                                  • FindFirstFileW.KERNELBASE(?,00000000,.ini,00000004,?,?,?,00000000,00000000,?,5D2E80A5), ref: 0059B706
                                                                                  • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0059B771
                                                                                  • SetFilePointer.KERNELBASE(00000000,00000002,?,00000000), ref: 0059B7B7
                                                                                  • ReadFile.KERNELBASE(00000000,?,?,?,00000000,00000078,?), ref: 0059B7F5
                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 0059B84E
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 0059B950
                                                                                  • SetCurrentDirectoryW.KERNELBASE(00000000), ref: 0059BBBD
                                                                                  • OpenMutexW.KERNEL32(00100000,00000000,Global\_MSIExecute), ref: 0059BBF7
                                                                                  • GetLastError.KERNEL32 ref: 0059BC11
                                                                                  • FindClose.KERNEL32(?), ref: 0059BCCC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseFindModuleName$CreateCurrentDirectoryErrorFirstHandleLastMutexOpenPointerRead
                                                                                  • String ID: 2#vp1#v$.ini$0!X$Global\_MSIExecute$he
                                                                                  • API String ID: 1061481847-515572728
                                                                                  • Opcode ID: 7bfab81895a62d52d07a7b1aaa81f8e259967166c4fc0d4b53f8d7feffc6d40f
                                                                                  • Instruction ID: cd330926f9239abbb543ffb80864ba4f99c68d68e3000aaeced67b16a5feed12
                                                                                  • Opcode Fuzzy Hash: 7bfab81895a62d52d07a7b1aaa81f8e259967166c4fc0d4b53f8d7feffc6d40f
                                                                                  • Instruction Fuzzy Hash: 9D32DD70A0064ADFEF10DFA8DD59BAEBFB5BF44320F144258E415A7281CB74AE05CBA1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1445 5ce3a0-5ce458 call 586530 call 586070 * 2 call 5a8f40 1454 5ce45e-5ce46d 1445->1454 1455 5ce714-5ce71f call 583620 1445->1455 1456 5ce46f-5ce472 call 585610 1454->1456 1457 5ce477-5ce48a call 600bc5 1454->1457 1456->1457 1457->1455 1463 5ce490-5ce4c0 call 586070 1457->1463 1466 5ce4da-5ce4df 1463->1466 1467 5ce4c2-5ce4d5 1463->1467 1468 5ce594-5ce5d4 1466->1468 1469 5ce4e5-5ce4ec 1466->1469 1467->1466 1472 5ce5df-5ce5eb ShellExecuteExW 1468->1472 1473 5ce5d6-5ce5dc GetForegroundWindow 1468->1473 1471 5ce4f0-5ce4f6 1469->1471 1474 5ce4f8-5ce4fb 1471->1474 1475 5ce516-5ce518 1471->1475 1476 5ce5ed-5ce5f3 1472->1476 1477 5ce612-5ce635 call 5ce7a0 1472->1477 1473->1472 1478 5ce4fd-5ce505 1474->1478 1479 5ce512-5ce514 1474->1479 1480 5ce51b-5ce51d 1475->1480 1481 5ce5fa-5ce60c ShellExecuteExW 1476->1481 1482 5ce5f5-5ce5f8 1476->1482 1488 5ce664-5ce684 call 5ce720 1477->1488 1489 5ce637-5ce65e GetModuleHandleW GetProcAddress GetProcessId AllowSetForegroundWindow 1477->1489 1478->1475 1485 5ce507-5ce510 1478->1485 1479->1480 1486 5ce51f-5ce524 1480->1486 1487 5ce555-5ce591 GetWindowsDirectoryW call 599d40 * 2 1480->1487 1481->1477 1482->1477 1482->1481 1485->1471 1485->1479 1491 5ce526-5ce52c 1486->1491 1487->1468 1502 5ce69d-5ce6ae 1488->1502 1503 5ce686-5ce69a 1488->1503 1489->1488 1494 5ce54c-5ce54e 1491->1494 1495 5ce52e-5ce531 1491->1495 1496 5ce551-5ce553 1494->1496 1500 5ce548-5ce54a 1495->1500 1501 5ce533-5ce53b 1495->1501 1496->1468 1496->1487 1500->1496 1501->1494 1505 5ce53d-5ce546 1501->1505 1506 5ce6c4-5ce6d9 1502->1506 1507 5ce6b0-5ce6c0 1502->1507 1503->1502 1505->1491 1505->1500 1508 5ce6ef-5ce713 call 5f43af 1506->1508 1509 5ce6db-5ce6eb 1506->1509 1507->1506 1509->1508
                                                                                  APIs
                                                                                  • GetWindowsDirectoryW.KERNEL32(00000010,00000104,?,00000004,?,00000000,?), ref: 005CE55E
                                                                                  • GetForegroundWindow.USER32(?,00000004,?,00000000,?), ref: 005CE5D6
                                                                                  • ShellExecuteExW.SHELL32(?), ref: 005CE5E3
                                                                                  • ShellExecuteExW.SHELL32(?), ref: 005CE60C
                                                                                  • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId), ref: 005CE641
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 005CE648
                                                                                  • GetProcessId.KERNELBASE ref: 005CE65B
                                                                                  • AllowSetForegroundWindow.USER32(00000000), ref: 005CE65E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExecuteForegroundShellWindow$AddressAllowDirectoryHandleModuleProcProcessWindows
                                                                                  • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$GetProcessId$Kernel32.dll$open$runas
                                                                                  • API String ID: 2271306907-986041216
                                                                                  • Opcode ID: 10e072249a569534c2da3da8541069d67f6d3a27bb2a8e36231ef066bc26cb7e
                                                                                  • Instruction ID: f3d325c21caa1a40ef1a9afcbcc9f06e1b023a40bb829c380a03bf64d0d1f855
                                                                                  • Opcode Fuzzy Hash: 10e072249a569534c2da3da8541069d67f6d3a27bb2a8e36231ef066bc26cb7e
                                                                                  • Instruction Fuzzy Hash: 8AB1BC71A00249CFDB10DFA8C889BADBBB5FF18314F14416DE515EB391EB31AA05CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1593 58ab00-58ab55 1594 58ab5b-58ab5e 1593->1594 1595 58b436-58b43b call 583620 1593->1595 1594->1595 1596 58ab64-58ab7a 1594->1596 1600 58b440 call 5f98af 1595->1600 1598 58ac39-58aca8 call 5f2684 call 58d0b0 call 588d00 call 58cee0 1596->1598 1599 58ab80-58ab8a call 5839b0 1596->1599 1628 58acb0-58acb9 1598->1628 1607 58b45b-58b460 call 583620 1599->1607 1608 58ab90-58abc8 call 585060 1599->1608 1605 58b445 call 5ff99b 1600->1605 1611 58b44a-58b456 call 5f2e9d 1605->1611 1616 58b465-58b46a call 583620 1607->1616 1629 58abca-58abcf 1608->1629 1630 58abec-58ac1a call 5aa750 1608->1630 1611->1607 1621 58b46f-58b552 call 583620 call 5f6430 call 5869b0 1616->1621 1646 58b554 1621->1646 1647 58b556-58b56d 1621->1647 1628->1628 1632 58acbb-58ace5 call 58d510 1628->1632 1634 58abd0-58abd9 1629->1634 1630->1598 1641 58ac1c-58ac36 1630->1641 1642 58ad2e-58ad4e 1632->1642 1643 58ace7-58acee 1632->1643 1634->1634 1638 58abdb-58abe7 call 585060 1634->1638 1638->1630 1641->1598 1649 58ad7c-58add4 call 5a6ce0 1642->1649 1650 58ad50-58ad67 1642->1650 1643->1642 1648 58acf0-58acf5 1643->1648 1646->1647 1651 58b570-58b579 1647->1651 1648->1642 1653 58acf7 1648->1653 1661 58add7-58ade0 1649->1661 1650->1649 1666 58ad69-58ad77 1650->1666 1651->1651 1655 58b57b-58b619 call 583c00 call 5f43d4 call 5ffbcc 1651->1655 1656 58ad00-58ad26 1653->1656 1678 58b71b-58b727 call 5f2e9d 1655->1678 1679 58b61f-58b65d call 594840 1655->1679 1674 58ad28 1656->1674 1661->1661 1665 58ade2-58ae4a call 583c00 call 586bc0 call 5843b0 call 583c00 call 586700 1661->1665 1701 58aeda 1665->1701 1702 58ae50-58ae91 call 583c00 call 586700 1665->1702 1666->1649 1674->1642 1686 58b72c call 5ff99b 1678->1686 1679->1686 1688 58b663-58b67b 1679->1688 1690 58b731-58b77f call 5f98af 1686->1690 1692 58b67d-58b68f 1688->1692 1693 58b6af-58b71a call 5843b0 * 3 call 5f43af 1688->1693 1705 58b781-58b791 1690->1705 1706 58b795-58b7a5 1690->1706 1697 58b691-58b69f 1692->1697 1698 58b6a5-58b6ac call 5f43bd 1692->1698 1697->1690 1697->1698 1698->1693 1709 58aede-58aeea 1701->1709 1702->1701 1731 58ae93-58aed8 call 583c00 call 586700 1702->1731 1705->1706 1710 58aeec-58aefa call 5843b0 1709->1710 1711 58aefd-58af06 1709->1711 1710->1711 1715 58af08-58af14 1711->1715 1716 58af5f-58af68 1711->1716 1721 58af4b-58af5b 1715->1721 1722 58af16-58af28 1715->1722 1725 58af6a-58af76 1716->1725 1726 58afbe-58afc2 1716->1726 1721->1716 1729 58af2a-58af38 1722->1729 1730 58af3e-58af48 call 5f43bd 1722->1730 1733 58af78-58af8a 1725->1733 1734 58afaa-58afba 1725->1734 1727 58afc8-58b01a call 5f43d4 call 5ffbcc 1726->1727 1728 58b069-58b070 call 5a4710 1726->1728 1727->1611 1758 58b020-58b047 call 594840 1727->1758 1748 58b121-58b12b call 5839b0 1728->1748 1749 58b076-58b090 1728->1749 1729->1600 1729->1730 1730->1721 1731->1701 1731->1709 1739 58af8c-58af9a 1733->1739 1740 58afa0-58afa7 call 5f43bd 1733->1740 1734->1726 1739->1600 1739->1740 1740->1734 1748->1607 1759 58b131-58b15a 1748->1759 1753 58b093-58b09c 1749->1753 1753->1753 1757 58b09e-58b0cc call 583c00 1753->1757 1765 58b0d0-58b0d9 1757->1765 1758->1605 1766 58b04d-58b058 1758->1766 1774 58b15c-58b165 call 585350 1759->1774 1775 58b167-58b16e call 585680 1759->1775 1765->1765 1767 58b0db-58b11c call 583c00 call 58ba30 call 5843b0 * 2 1765->1767 1766->1605 1768 58b05e-58b064 1766->1768 1802 58b1c9 1767->1802 1771 58b1cc-58b1ce 1768->1771 1772 58b2d0-58b2d7 1771->1772 1773 58b1d4-58b1e6 1771->1773 1777 58b35c-58b399 call 58c8d0 call 5bff10 1772->1777 1778 58b2dd-58b2e6 call 5839b0 1772->1778 1773->1777 1779 58b1ec-58b1f5 call 5839b0 1773->1779 1788 58b173-58b18d call 5a7bd0 1774->1788 1775->1788 1807 58b39b-58b3a8 1777->1807 1778->1621 1794 58b2ec-58b346 call 585060 call 5a5f60 call 5aa750 1778->1794 1779->1616 1795 58b1fb-58b245 call 585060 call 5a9710 1779->1795 1797 58b192-58b1ad 1788->1797 1794->1777 1835 58b348-58b358 1794->1835 1827 58b269-58b28f call 5aa750 1795->1827 1828 58b247-58b24c 1795->1828 1798 58b1af-58b1bf 1797->1798 1799 58b1c3 1797->1799 1798->1799 1799->1802 1802->1771 1809 58b3aa-58b3b4 1807->1809 1810 58b3b6-58b3bb Sleep 1807->1810 1809->1810 1812 58b3c1-58b3c5 1809->1812 1810->1812 1815 58b3d2 1812->1815 1816 58b3c7-58b3d0 1812->1816 1819 58b3d6-58b3ee 1815->1819 1816->1815 1816->1819 1824 58b3f0-58b400 1819->1824 1825 58b404-58b433 call 5843b0 call 5f43af 1819->1825 1824->1825 1840 58b291-58b2a1 1827->1840 1841 58b2a5-58b2ba 1827->1841 1831 58b250-58b259 1828->1831 1831->1831 1836 58b25b-58b264 call 585060 1831->1836 1835->1777 1836->1827 1840->1841 1841->1772 1843 58b2bc-58b2cc 1841->1843 1843->1772
                                                                                  APIs
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0058B456
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?,?,?,00633AD2,?,?,?), ref: 0058B3BB
                                                                                    • Part of subcall function 005A9710: FormatMessageW.KERNEL32(00001300,00000000,00000007,00000400,?,00000000,00000000,5D2E80A5,00000000,?), ref: 005A975B
                                                                                    • Part of subcall function 005A9710: GetLastError.KERNEL32 ref: 005A9765
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0058B727
                                                                                    • Part of subcall function 00594840: GetCurrentThreadId.KERNEL32 ref: 00594850
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentErrorFormatHeapLastMessageProcessSleepThread
                                                                                  • String ID: Launch failed. Error:$Launching file:$Return code of launched file:$appx$he$he$he$msix$msixbundle
                                                                                  • API String ID: 3855751301-547343951
                                                                                  • Opcode ID: d2dd1a7f5b73303f9120fe85be890a0e16f3b25e7a92ddb56e1a7c21e5e2cdaa
                                                                                  • Instruction ID: 99abbdfc39b9129bdfcdf6b6a49444945bf3dd76d275bf4898cf1f21395edc32
                                                                                  • Opcode Fuzzy Hash: d2dd1a7f5b73303f9120fe85be890a0e16f3b25e7a92ddb56e1a7c21e5e2cdaa
                                                                                  • Instruction Fuzzy Hash: 2382EF70D00249CFEB10EF68C859BADBBB5BF44314F248299E815B7392EB746A45CF91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1889 5a4710-5a4777 GetCurrentProcess OpenProcessToken 1892 5a4779-5a4781 GetLastError 1889->1892 1893 5a4786-5a47a5 GetTokenInformation 1889->1893 1894 5a4846-5a4859 1892->1894 1895 5a47d7-5a47db 1893->1895 1896 5a47a7-5a47b0 GetLastError 1893->1896 1897 5a485b-5a4862 CloseHandle 1894->1897 1898 5a4869-5a4885 call 5f43af 1894->1898 1899 5a482a GetLastError 1895->1899 1901 5a47dd-5a480c AllocateAndInitializeSid 1895->1901 1896->1899 1900 5a47b2-5a47d5 call 5a4890 GetTokenInformation 1896->1900 1897->1898 1905 5a4830 1899->1905 1900->1895 1900->1899 1904 5a480e-5a4828 EqualSid FreeSid 1901->1904 1901->1905 1908 5a4832-5a483f call 5f4964 1904->1908 1905->1908 1908->1894
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32 ref: 005A4762
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 005A476F
                                                                                  • GetLastError.KERNEL32 ref: 005A4779
                                                                                  • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,0061AE75), ref: 005A479D
                                                                                  • GetLastError.KERNEL32 ref: 005A47A7
                                                                                  • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,0061AE75,0061AE75,0061AE75), ref: 005A47CD
                                                                                  • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 005A4804
                                                                                  • EqualSid.ADVAPI32(00000000,?), ref: 005A4813
                                                                                  • FreeSid.ADVAPI32(?), ref: 005A4822
                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 005A485C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Token$ErrorInformationLastProcess$AllocateCloseCurrentEqualFreeHandleInitializeOpen
                                                                                  • String ID:
                                                                                  • API String ID: 695978879-0
                                                                                  • Opcode ID: ddeea5b272ee991e18c2888b54c6fe6f2fb9a4e9011e0a42e7d179da7c3c8d27
                                                                                  • Instruction ID: dd71c258df6047e6cd953e7cfe5a0d4e187e81f80b5ec1ed5e1625c3499c7e80
                                                                                  • Opcode Fuzzy Hash: ddeea5b272ee991e18c2888b54c6fe6f2fb9a4e9011e0a42e7d179da7c3c8d27
                                                                                  • Instruction Fuzzy Hash: 4641347190021AABDF20DFA0EC49BEEBFB9FF09715F105018E411B2290D7B95A09DFA4

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2028 5a98c0-5a9918 LoadLibraryW 2029 5a991a-5a992a GetProcAddress 2028->2029 2030 5a9950-5a9993 GetSystemMetrics * 2 LoadImageW 2028->2030 2029->2030 2032 5a992c-5a9945 2029->2032 2031 5a9996-5a99a6 2030->2031 2033 5a99a8-5a99af FreeLibrary 2031->2033 2034 5a99b6-5a99c9 2031->2034 2036 5a9947-5a9949 2032->2036 2033->2034 2036->2030 2037 5a994b-5a994e 2036->2037 2037->2031
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(ComCtl32.dll,5D2E80A5,00000007,00000007,?), ref: 005A98FA
                                                                                  • GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 005A9920
                                                                                  • GetSystemMetrics.USER32(0000000C), ref: 005A9960
                                                                                  • GetSystemMetrics.USER32(0000000B), ref: 005A9978
                                                                                  • LoadImageW.USER32(?,?,00000001,00000000,00000000,?), ref: 005A998B
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 005A99A9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoadMetricsSystem$AddressFreeImageProc
                                                                                  • String ID: ComCtl32.dll$LoadIconMetric
                                                                                  • API String ID: 1983857168-764666640
                                                                                  • Opcode ID: 1aa905332f27864172162337e7a5af009e0aa428ff990185d09e54c5d1b11d78
                                                                                  • Instruction ID: 86d52320c5c1cca7b92cccb3785f7604cceea0f855c59555b2698625a9b7c5b4
                                                                                  • Opcode Fuzzy Hash: 1aa905332f27864172162337e7a5af009e0aa428ff990185d09e54c5d1b11d78
                                                                                  • Instruction Fuzzy Hash: 48319AB1A04629AFDB108FA4CC09BAFBFBAFB45750F04022DF825A3390D7755D058BA0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2161 59dd10-59dd5d 2162 59ddfb-59de25 2161->2162 2163 59dd63-59dd65 2161->2163 2164 59de2b-59de30 2162->2164 2165 59debc-59dec5 2162->2165 2166 59dd6b-59dd71 2163->2166 2167 59e01d-59e022 call 583620 2163->2167 2171 59e018 call 583430 2164->2171 2172 59de36-59de3f 2164->2172 2169 59decb 2165->2169 2170 59dfd6-59e017 call 59e820 call 5f43af 2165->2170 2166->2167 2173 59dd77-59dd93 DeleteFileW 2166->2173 2175 59e027 call 5842d0 2167->2175 2176 59ded0-59df1a call 586070 call 585060 call 5f6430 2169->2176 2171->2167 2177 59de41-59de43 2172->2177 2178 59de45-59de4b 2172->2178 2173->2167 2180 59dd99-59ddb8 call 5a6400 call 5a69c0 2173->2180 2190 59e02c-59e048 call 5f98af 2175->2190 2216 59df1c-59df2d 2176->2216 2217 59df47-59df4c 2176->2217 2183 59de7f-59deb9 call 5bb6d0 2177->2183 2184 59de4d-59de52 2178->2184 2185 59de76-59de7c call 5f43d4 2178->2185 2203 59ddbd-59ddd5 2180->2203 2183->2165 2184->2175 2193 59de58-59de65 call 5f43d4 2184->2193 2185->2183 2210 59e04a-59e05d 2190->2210 2211 59e05e-59e066 2190->2211 2193->2190 2207 59de6b-59de74 2193->2207 2208 59ddee-59ddf5 2203->2208 2209 59ddd7-59ddeb 2203->2209 2207->2183 2208->2162 2208->2163 2209->2208 2210->2211 2220 59df2f-59df3f 2216->2220 2221 59df43-59df45 2216->2221 2222 59df50-59df55 2217->2222 2220->2221 2223 59df9b-59dfa5 PathIsDirectoryW 2221->2223 2227 59df5c-59df5e 2222->2227 2224 59dfbc-59dfbe 2223->2224 2225 59dfa7-59dfb7 call 59e270 2223->2225 2229 59dfca-59dfd0 2224->2229 2230 59dfc0-59dfc5 call 5bb350 2224->2230 2225->2224 2227->2222 2231 59df60-59df82 FindClose 2227->2231 2229->2170 2229->2176 2230->2229 2231->2223 2234 59df84-59df98 2231->2234 2234->2223
                                                                                  APIs
                                                                                  • DeleteFileW.KERNELBASE(?,5D2E80A5,?,?,?,?,?,?,?,?,?,?,00619EB6,000000FF), ref: 0059DD87
                                                                                  • FindFirstFileW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,?,00619EB6,000000FF), ref: 0059DF0E
                                                                                  • FindNextFileW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,?,?,00619EB6,000000FF), ref: 0059DF56
                                                                                  • FindClose.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00619EB6,000000FF), ref: 0059DF61
                                                                                  • PathIsDirectoryW.SHLWAPI(00000000), ref: 0059DF9D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$CloseDeleteDirectoryFirstNextPath
                                                                                  • String ID: 2#vp1#v$p2#v3#v
                                                                                  • API String ID: 3278268132-230733403
                                                                                  • Opcode ID: 1cc469ba3fa7638f1e912cd12eee99749bca18fb5390815ef2e89a4999a6494c
                                                                                  • Instruction ID: be6128675593f49dfa73d16890d16584c6b6cd2c4124576c8a24fc5a4078ca48
                                                                                  • Opcode Fuzzy Hash: 1cc469ba3fa7638f1e912cd12eee99749bca18fb5390815ef2e89a4999a6494c
                                                                                  • Instruction Fuzzy Hash: DCA1947190060A8FDF10DF68CC89BEEBBB5FF48314F144669E425A7391DB74A905CBA1
                                                                                  APIs
                                                                                    • Part of subcall function 005B4650: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,00000000,00000000), ref: 005B478F
                                                                                    • Part of subcall function 005B4650: GetProcAddress.KERNEL32(00000000), ref: 005B4796
                                                                                    • Part of subcall function 005B4650: GetCurrentProcess.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 005B47D0
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 005B4464
                                                                                  • FindClose.KERNEL32(00000000), ref: 005B4498
                                                                                  • FindClose.KERNEL32(00000000), ref: 005B4544
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$Close$AddressCurrentFileFirstHandleModuleProcProcess
                                                                                  • String ID: 2#vp1#v$0!X
                                                                                  • API String ID: 3560309239-2211160475
                                                                                  • Opcode ID: 03a84396bc91e983bc52816112edf48d0d5ecc4c549b4623cb157b22fee6cae4
                                                                                  • Instruction ID: 8cb8dd308887d39114ca78a3a6651de1ee2e36b13c7cfb50e0dde19a9772d8a7
                                                                                  • Opcode Fuzzy Hash: 03a84396bc91e983bc52816112edf48d0d5ecc4c549b4623cb157b22fee6cae4
                                                                                  • Instruction Fuzzy Hash: B0A1A431905A558BCB34DF28C8587ADBBB5FF45324F284699E429A73D2CB35AD81CF80
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNELBASE(?,?), ref: 005A6C41
                                                                                  • FindClose.KERNEL32(00000000,?,?), ref: 005A6CA0
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$AllocateCloseFileFirstHeap
                                                                                  • String ID: 2#vp1#v$0!X
                                                                                  • API String ID: 1673784098-2211160475
                                                                                  • Opcode ID: 4eff775785db55a9910ea695e2d9363916040086f589c290406f085af3620300
                                                                                  • Instruction ID: 8ca9fb58edb001c3b0edd63d50c6ea31238a1304111beada3f137849d4681772
                                                                                  • Opcode Fuzzy Hash: 4eff775785db55a9910ea695e2d9363916040086f589c290406f085af3620300
                                                                                  • Instruction Fuzzy Hash: E531EF31908618DBCB20DF14C849B5EBBB4FB4A320F24866AE859D3380E7309D448F90
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000001,?), ref: 005BFF95
                                                                                  • RegSetValueExA.KERNELBASE(?,?,00000000,00000001,?,?), ref: 005BFFAD
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 005C02C4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$AllocateCreateOpenProcessValue
                                                                                  • String ID: -
                                                                                  • API String ID: 1583728613-2547889144
                                                                                  • Opcode ID: 31f0246d6faf30a2ea6b0eb78c47bf929b477cddb2a14064540b7c2391fa4622
                                                                                  • Instruction ID: 5e680a00f17cbffc3bfb8e16ce3d707b7c6df5c7888c1f29a3c3e467edf99f3f
                                                                                  • Opcode Fuzzy Hash: 31f0246d6faf30a2ea6b0eb78c47bf929b477cddb2a14064540b7c2391fa4622
                                                                                  • Instruction Fuzzy Hash: 22E19171A00619DFDB00DF98CC45BAEBBB9FF88720F14422AE915E7391DB75A905CB90
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008,?,005BA67E), ref: 005F1F2F
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 005F1F36
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005F1F7C
                                                                                  • HeapFree.KERNEL32(00000000), ref: 005F1F83
                                                                                    • Part of subcall function 005F1DC8: GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,005F1F72,00000000), ref: 005F1DEC
                                                                                    • Part of subcall function 005F1DC8: HeapAlloc.KERNEL32(00000000,?,005F1F72,00000000), ref: 005F1DF3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Process$Alloc$Free
                                                                                  • String ID:
                                                                                  • API String ID: 1864747095-0
                                                                                  • Opcode ID: dcb34967717746e0e21851d68a8377fbb7a647e1c341b8d97c7fcfb3ef7b3af3
                                                                                  • Instruction ID: 342e759528ecc2b6a279290d756b9095c4e9575bbb0795e7db5eb2b43fd3baa7
                                                                                  • Opcode Fuzzy Hash: dcb34967717746e0e21851d68a8377fbb7a647e1c341b8d97c7fcfb3ef7b3af3
                                                                                  • Instruction Fuzzy Hash: 18F0B472648E16D7C7302B78BC0DE7B2D6ABF80BA1701482CF645C7240DF3488068778
                                                                                  APIs
                                                                                  • CoCreateInstance.OLE32(006313FC,00000000,00000001,00638A3C,000000B0,5D2E80A5,00000000,?,00000000,000000A0,-00000010,0062373C,000000FF,?,005CD39B), ref: 005D4C6D
                                                                                    • Part of subcall function 005F46AF: AcquireSRWLockExclusive.KERNEL32(0064FFB8,?,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46BA
                                                                                    • Part of subcall function 005F46AF: ReleaseSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46F4
                                                                                    • Part of subcall function 005F465E: AcquireSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583AC7,00650848,00626460), ref: 005F4668
                                                                                    • Part of subcall function 005F465E: ReleaseSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583AC7,00650848,00626460), ref: 005F469B
                                                                                    • Part of subcall function 005F465E: WakeAllConditionVariable.KERNEL32(0064FFB4,?,?,00583AC7,00650848,00626460), ref: 005F46A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExclusiveLock$AcquireRelease$ConditionCreateInstanceVariableWake
                                                                                  • String ID:
                                                                                  • API String ID: 1170529896-0
                                                                                  • Opcode ID: 699ac99ff8fb2205ddf6c7956f082eb0629728b99de9460d471d836192a0932a
                                                                                  • Instruction ID: dcd626849be0ebf0072683a18750a4eae95c8ebec5059d090285729ba9234384
                                                                                  • Opcode Fuzzy Hash: 699ac99ff8fb2205ddf6c7956f082eb0629728b99de9460d471d836192a0932a
                                                                                  • Instruction Fuzzy Hash: 9B41C071601346DFE724DF08EC9AB4ABBB2FB02715F20421AE4159B3E1D3B56944CF99

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 491 59cb20-59cb5c call 5839b0 494 59d57a-59d57f call 583620 491->494 495 59cb62-59cb8f call 58cb10 491->495 498 59d584-59d605 call 583620 call 58c660 call 5c3440 494->498 506 59cb9e-59cbeb call 5b9b90 495->506 507 59cb91-59cb99 call 59e8c0 495->507 514 59d61b-59d62b 498->514 515 59d607-59d617 498->515 516 59cbed-59cc01 506->516 517 59cc04-59cc08 506->517 507->506 515->514 516->517 518 59cc0e-59cc1f 517->518 519 59cdd5 517->519 520 59cc21-59cc2d call 5b4320 518->520 521 59cc32-59cca5 call 5ba550 CreateThread 518->521 522 59cdd7-59cdf1 519->522 537 59cd0e-59cd15 520->537 538 59ccb0-59ccc7 call 5a7a00 521->538 539 59cca7-59ccad GetLastError 521->539 527 59d514-59d518 522->527 528 59cdf7-59ce05 522->528 532 59d528-59d54d 527->532 533 59d51a-59d522 RegDeleteKeyA 527->533 534 59ce0b call 59c6a0 528->534 535 59d507-59d50f 528->535 540 59d54f-59d55f 532->540 541 59d563-59d577 532->541 533->532 542 59ce10 534->542 547 59d511 535->547 543 59cd5a-59cd61 537->543 544 59cd17-59cd19 537->544 538->537 554 59ccc9-59ccd7 WaitForSingleObject 538->554 539->538 540->541 542->547 543->519 549 59cd63-59cd6c call 5839b0 543->549 548 59cd20-59cd22 544->548 547->527 548->498 552 59cd28-59cd2a 548->552 549->494 562 59cd72-59cdbf call 585060 call 5aa750 549->562 552->498 555 59cd30-59cd3a 552->555 557 59ccd9-59ccef GetExitCodeThread 554->557 558 59cd05-59cd08 CloseHandle 554->558 560 59cd40-59cd43 555->560 561 59ce15-59ce4f call 5bb9e0 call 5c0a50 call 5b3b20 555->561 557->558 559 59ccf1-59ccf8 557->559 558->537 559->558 563 59ccfa-59ccff TerminateThread 559->563 560->561 565 59cd49-59cd4c 560->565 577 59cf3e-59cf47 call 5839b0 561->577 578 59ce55-59ce5c 561->578 562->519 583 59cdc1-59cdd1 562->583 563->558 565->561 568 59cd52-59cd58 565->568 568->543 568->548 577->494 587 59cf4d-59cf75 577->587 581 59cecf-59cf0f call 5c2ff0 call 5c0f80 call 5c1eb0 call 5c2750 578->581 582 59ce5e-59ce67 call 5839b0 578->582 608 59d273 581->608 609 59cf15-59cf2e call 5c0d00 call 5c2df0 581->609 582->494 592 59ce6d-59ceb9 call 585060 call 5aa750 582->592 583->519 599 59cf82-59cf87 call 5a6150 587->599 600 59cf77-59cf80 call 585350 587->600 592->581 629 59cebb-59cecb 592->629 611 59cf8c-59cf95 599->611 600->611 616 59d275-59d27c 608->616 609->608 648 59cf34-59cf39 609->648 614 59cf9c-59cfa3 611->614 615 59cf97-59cf9a 611->615 620 59cfaa-59cfb6 call 5f5dee 614->620 621 59cfa5-59cfa8 614->621 619 59cfc2-59cfde 615->619 622 59d282-59d28b call 5839b0 616->622 623 59d335-59d33c 616->623 624 59cfe0-59cff0 619->624 625 59cff4-59cff8 619->625 650 59cfb8-59cfbb 620->650 651 59cfbd-59cfc0 620->651 621->619 622->494 652 59d291-59d2e0 call 585060 * 2 622->652 626 59d342-59d349 623->626 627 59d4c4-59d4c8 623->627 624->625 625->608 634 59cffe-59d005 625->634 632 59d34f-59d358 call 5839b0 626->632 633 59d3f3-59d3fa 626->633 638 59d4ca-59d4e9 call 59d590 627->638 639 59d4ee-59d502 call 59d590 627->639 629->581 632->494 661 59d35e-59d39e call 585060 632->661 646 59d400-59d407 633->646 647 59d4b2-59d4b9 633->647 644 59d078-59d08b 634->644 645 59d007-59d010 call 5839b0 634->645 638->522 639->522 654 59d08d-59d097 644->654 655 59d0f2-59d17c call 5d4b00 call 5c2ff0 GetActiveWindow 644->655 645->494 671 59d016-59d062 call 585060 call 5aa750 645->671 646->647 660 59d40d-59d416 call 5839b0 646->660 647->627 656 59d4bb-59d4c2 647->656 648->616 650->619 651->619 707 59d2e3-59d2ec 652->707 663 59d099-59d0a3 call 58c850 call 5af8e0 654->663 664 59d0a8-59d0dc call 5a9b20 call 599d40 654->664 687 59d17e-59d188 call 5f1f2a 655->687 688 59d1c0-59d253 call 5f202c GetCurrentThreadId EnterCriticalSection LeaveCriticalSection DialogBoxParamW WaitForSingleObject CloseHandle 655->688 656->627 656->638 660->494 677 59d41c-59d45c call 585060 660->677 705 59d3a1-59d3aa 661->705 663->664 664->655 692 59d0de-59d0ee 664->692 671->644 722 59d064-59d074 671->722 718 59d460-59d469 677->718 687->688 708 59d18a-59d1a6 SetLastError WaitForSingleObject CloseHandle 687->708 703 59d259-59d25c 688->703 704 59d1ad-59d1b6 call 5c41c0 688->704 692->655 703->704 712 59d262-59d271 call 5c41c0 703->712 716 59d1bb 704->716 705->705 714 59d3ac-59d3dd call 585060 call 5aa750 705->714 707->707 713 59d2ee-59d31f call 585060 call 5aa750 707->713 708->704 712->616 713->623 736 59d321-59d331 713->736 714->633 735 59d3df-59d3ef 714->735 716->616 718->718 723 59d46b-59d49c call 585060 call 5aa750 718->723 722->644 723->647 738 59d49e-59d4ae 723->738 735->633 736->623 738->647
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                    • Part of subcall function 0058CB10: FindResourceW.KERNEL32(00000000,00000100,00000006,00000000,000000FF,?,00000000,005BA070,000000FF,?,?,?,5D2E80A5,00000000,?,000000FF), ref: 0058CB4D
                                                                                    • Part of subcall function 0058CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,?,5D2E80A5,00000000,?,000000FF), ref: 0058CB7E
                                                                                    • Part of subcall function 0058CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,?,00000000,00000000,00000000,?,?,?,5D2E80A5,00000000,?,000000FF,000000FF), ref: 0058CBB5
                                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0004CE80,?,00000000,?), ref: 0059CC9A
                                                                                  • GetLastError.KERNEL32 ref: 0059CCA7
                                                                                    • Part of subcall function 005BB9E0: GetCurrentThreadId.KERNEL32 ref: 005BB9E9
                                                                                    • Part of subcall function 005BB9E0: DestroyWindow.USER32(?), ref: 005BB9F8
                                                                                    • Part of subcall function 005AA750: InitializeCriticalSection.KERNEL32(00650A68,5D2E80A5,00000000,?), ref: 005AA78C
                                                                                    • Part of subcall function 005AA750: EnterCriticalSection.KERNEL32(?,5D2E80A5,00000000,?), ref: 005AA799
                                                                                    • Part of subcall function 005AA750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA7CB
                                                                                    • Part of subcall function 005AA750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA7D4
                                                                                    • Part of subcall function 005AA750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,00634EF4,00000001,?,?,000000FF,00000000), ref: 005AA86C
                                                                                    • Part of subcall function 005AA750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA875
                                                                                  • WaitForSingleObject.KERNEL32(?,?), ref: 0059CCCD
                                                                                  • GetExitCodeThread.KERNEL32(?,?), ref: 0059CCE7
                                                                                  • TerminateThread.KERNEL32(?,00000000), ref: 0059CCFF
                                                                                  • CloseHandle.KERNELBASE(?), ref: 0059CD08
                                                                                  • GetActiveWindow.USER32 ref: 0059D16F
                                                                                  • SetLastError.KERNEL32(0000000E,?,00636134), ref: 0059D18C
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00636134), ref: 0059D197
                                                                                  • CloseHandle.KERNEL32(?,?,00636134), ref: 0059D1A0
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0059D1D0
                                                                                  • EnterCriticalSection.KERNEL32(00652C5C,?,00636134), ref: 0059D1ED
                                                                                  • LeaveCriticalSection.KERNEL32(00652C5C,?,00636134), ref: 0059D210
                                                                                  • DialogBoxParamW.USER32(000000D8,00000000,Function_0003BD70,00000000), ref: 0059D22D
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00636134), ref: 0059D23A
                                                                                  • CloseHandle.KERNEL32(?,?,00636134), ref: 0059D243
                                                                                    • Part of subcall function 005AA750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,?,?,000000FF,00000000), ref: 005AA8BD
                                                                                    • Part of subcall function 005AA750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA8C6
                                                                                    • Part of subcall function 005AA750: WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,006337E8,00000002,?,?,000000FF,00000000), ref: 005AA935
                                                                                    • Part of subcall function 005AA750: FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA93E
                                                                                    • Part of subcall function 005AA750: LeaveCriticalSection.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA97A
                                                                                  • RegDeleteKeyA.ADVAPI32(80000001,?), ref: 0059D522
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CriticalSectionThread$BuffersFlushWrite$CloseHandleObjectSingleWait$ByteCharCurrentEnterErrorLastLeaveMultiWideWindow$ActiveCodeCreateDeleteDestroyDialogExitFindHeapInitializeParamProcessResourceTerminate
                                                                                  • String ID: Reboot in Progress=$ Reboot was refused=$ Reboot was required=$4ac$After running prerequisites we have:$InterbootContext$No prerequisite must be installed.$Starting installing prerequisites in basic UI mode.$Starting installing prerequisites in silent mode.$Tsc$\,e$false$he$he$he$he$he$he$true$Ec
                                                                                  • API String ID: 2565466407-3292787948
                                                                                  • Opcode ID: 17571350571a7cc09cb897ba58002a4d454ae46785e3b5280fe7c8b4f49edd4e
                                                                                  • Instruction ID: bc94359adef2afa39f42794f1c3b422b2b671d586eec1a9a841796d7e4ec5882
                                                                                  • Opcode Fuzzy Hash: 17571350571a7cc09cb897ba58002a4d454ae46785e3b5280fe7c8b4f49edd4e
                                                                                  • Instruction Fuzzy Hash: 1D72DD30900249DFDF11EF68C859BADBFB5BF44324F188298F816A7391DB749A45CBA1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 742 5aef30-5aefb2 RegOpenKeyExW 745 5aefb8-5aefe7 RegQueryValueExW 742->745 746 5af222-5af23b 742->746 749 5aefe9-5aeffb call 586620 745->749 750 5af037-5af066 RegQueryValueExW 745->750 747 5af24e-5af269 call 5f43af 746->747 748 5af23d-5af244 RegCloseKey 746->748 748->747 759 5af00c-5af023 call 586620 749->759 760 5aeffd-5af00a 749->760 750->746 753 5af06c-5af07d 750->753 756 5af08a-5af08c 753->756 757 5af07f 753->757 756->746 758 5af092-5af099 756->758 761 5af080-5af088 757->761 762 5af0a0-5af0ae call 586620 758->762 768 5af02a-5af030 759->768 769 5af025 759->769 763 5af032 760->763 761->756 761->761 770 5af0b9-5af0c7 call 586620 762->770 771 5af0b0-5af0b4 762->771 763->750 768->763 769->768 776 5af0c9-5af0cd 770->776 777 5af0d2-5af0e0 call 586620 770->777 772 5af1f4 771->772 775 5af1fb-5af208 772->775 778 5af21a-5af21c 775->778 779 5af20a 775->779 776->772 783 5af0eb-5af0f9 call 586620 777->783 784 5af0e2-5af0e6 777->784 778->746 778->762 781 5af210-5af218 779->781 781->778 781->781 787 5af0fb-5af0ff 783->787 788 5af104-5af112 call 586620 783->788 784->772 787->772 791 5af11d-5af12b call 586620 788->791 792 5af114-5af118 788->792 795 5af12d-5af131 791->795 796 5af136-5af144 call 586620 791->796 792->772 795->772 799 5af14f-5af15d call 586620 796->799 800 5af146-5af14a 796->800 803 5af169-5af177 call 586620 799->803 804 5af15f-5af164 799->804 800->772 808 5af179-5af17e 803->808 809 5af180-5af18e call 586620 803->809 805 5af1f1 804->805 805->772 808->805 812 5af190-5af195 809->812 813 5af197-5af1a5 call 586620 809->813 812->805 816 5af1ae-5af1bc call 586620 813->816 817 5af1a7-5af1ac 813->817 820 5af1be-5af1c3 816->820 821 5af1c5-5af1d3 call 586620 816->821 817->805 820->805 824 5af1dc-5af1ea call 586620 821->824 825 5af1d5-5af1da 821->825 824->775 828 5af1ec 824->828 825->805 828->805
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\CurrentControlSet\Control\ProductOptions,00000000,00020119,00000000), ref: 005AEFAA
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,ProductType,00000000,00000000,?,?), ref: 005AEFDF
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,ProductSuite,00000000,00000000,?,?), ref: 005AF05E
                                                                                  • RegCloseKey.KERNELBASE(00000000), ref: 005AF23E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue$CloseOpen
                                                                                  • String ID: BackOffice$Blade$CommunicationServer$Compute Server$DataCenter$Embedded(Restricted)$EmbeddedNT$Enterprise$Personal$ProductSuite$ProductType$SYSTEM\CurrentControlSet\Control\ProductOptions$Security Appliance$ServerNT$Small Business$Small Business(Restricted)$Storage Server$Terminal Server$WinNT
                                                                                  • API String ID: 1586453840-3149529848
                                                                                  • Opcode ID: 4c354b8571eb7e50df7a69b5bebfc12897651a9d1bf39199b96396ca796bd2fd
                                                                                  • Instruction ID: d3729ae60d9d1ae2b320bbd1036910f7d93a89278ed86466b55702b6888d46cb
                                                                                  • Opcode Fuzzy Hash: 4c354b8571eb7e50df7a69b5bebfc12897651a9d1bf39199b96396ca796bd2fd
                                                                                  • Instruction Fuzzy Hash: 5171B23470035A9BDB20AF65DD45BAEBEA6FB82340F104575A906AB382FB34CD458B81
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?), ref: 005C14CE
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005C14F5
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 005C1502
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005C151A
                                                                                  • DeleteFileW.KERNEL32(00000000), ref: 005C190E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseHandle$CreateDeleteSize
                                                                                  • String ID: !$Download completed succesfully.$Download failed. Error:$Download was canceled.$Downloaded file was accepted.$Downloaded file was rejected.(Invalid size or MD5).$Launching URL:$Starting download of:$[InternetShortcut]URL=%s$he$he$he$he$he$he$he$open
                                                                                  • API String ID: 3145970413-4187155845
                                                                                  • Opcode ID: 917a0a44b831cdca84e1fd61008bb97aaeee0e216cca65a8420c1f6bb2b9810e
                                                                                  • Instruction ID: 5deb90c3d1224bea03ac0d6a5545ccea7ac1b805534c392ec75fc904b42a1df5
                                                                                  • Opcode Fuzzy Hash: 917a0a44b831cdca84e1fd61008bb97aaeee0e216cca65a8420c1f6bb2b9810e
                                                                                  • Instruction Fuzzy Hash: B072B234A00A55CFDB14DFA8C898B6DBBB6FF85310F18415DE915AB392DB30AD06CB90

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1083 5aeb80-5aec00 RegOpenKeyExW 1086 5aeede-5aeef7 1083->1086 1087 5aec06-5aec69 RegQueryValueExW * 2 1083->1087 1090 5aef0a-5aef23 call 5f43af 1086->1090 1091 5aeef9-5aef00 RegCloseKey 1086->1091 1088 5aeccb-5aed10 RegQueryValueExW 1087->1088 1089 5aec6b-5aeca1 RegQueryValueExW 1087->1089 1094 5aed38 1088->1094 1095 5aed12-5aed36 call 586570 1088->1095 1089->1088 1093 5aeca3-5aecab 1089->1093 1091->1090 1093->1093 1097 5aecad-5aecb0 1093->1097 1099 5aed3d-5aed44 1094->1099 1095->1099 1097->1088 1102 5aecb2-5aecc5 1097->1102 1100 5aed46-5aed4b 1099->1100 1101 5aed57-5aed86 RegQueryValueExW 1099->1101 1100->1101 1104 5aed4d 1100->1104 1105 5aed88-5aeda7 call 586570 1101->1105 1106 5aedac-5aeddb RegQueryValueExW 1101->1106 1102->1088 1104->1101 1105->1106 1108 5aee3a-5aee4d 1106->1108 1109 5aeddd-5aedec 1106->1109 1113 5aee4f-5aee63 call 5f46af 1108->1113 1114 5aee96-5aee9e 1108->1114 1111 5aedee-5aedf9 1109->1111 1112 5aee0f-5aee1d 1109->1112 1118 5aee00-5aee0d 1111->1118 1119 5aee2a-5aee35 1112->1119 1120 5aee1f 1112->1120 1113->1114 1124 5aee65-5aee93 GetModuleHandleW GetProcAddress call 5f465e 1113->1124 1116 5aeed2 1114->1116 1117 5aeea0-5aeec4 GetCurrentProcess IsWow64Process 1114->1117 1122 5aeed4-5aeed9 call 5aef30 1116->1122 1117->1116 1128 5aeec6-5aeed0 1117->1128 1118->1112 1118->1118 1119->1108 1123 5aee20-5aee28 1120->1123 1122->1086 1123->1119 1123->1123 1124->1114 1128->1122
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 005AEBF8
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 005AEC39
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 005AEC5C
                                                                                  • RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 005AEC8F
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 005AED08
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,ReleaseId,00000000,00000000,?,?), ref: 005AED7E
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,CSDVersion,00000000,00000000,?,?), ref: 005AEDD3
                                                                                  • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 005AEE73
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 005AEE7A
                                                                                  • GetCurrentProcess.KERNEL32(?), ref: 005AEEB1
                                                                                  • IsWow64Process.KERNEL32 ref: 005AEEC0
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 005AEEFA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue$Process$AddressCloseCurrentHandleModuleOpenProcWow64
                                                                                  • String ID: CSDVersion$CurrentBuildNumber$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$IsWow64Process$ReleaseId$Software\Microsoft\Windows NT\CurrentVersion$kernel32$,e
                                                                                  • API String ID: 2654979339-1525434530
                                                                                  • Opcode ID: c898a70d24fb824ba9f7e3054f13d8b06c3d0a389e0230360aa172ce2557c5f3
                                                                                  • Instruction ID: 69678106d4a6f36a7ffbd5e3dde3f78657a737b3075a6ea543c30579787808fb
                                                                                  • Opcode Fuzzy Hash: c898a70d24fb824ba9f7e3054f13d8b06c3d0a389e0230360aa172ce2557c5f3
                                                                                  • Instruction Fuzzy Hash: ACA17FB0900769DFDB60CF14CD49B9EBBBAFB55712F0002A9E409A7291EB355E94CF50

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1130 5b4650-5b469b 1131 5b46a1-5b46a4 1130->1131 1132 5b4c05-5b4c0a call 583620 1130->1132 1131->1132 1133 5b46aa-5b46c3 1131->1133 1137 5b4c0f-5b4c19 call 583620 1132->1137 1135 5b46c9-5b46cf call 5c4e10 1133->1135 1136 5b482c-5b484b call 5f43af 1133->1136 1142 5b46d4-5b46d6 1135->1142 1144 5b4b4e-5b4b55 1142->1144 1145 5b46dc-5b46e6 call 5c5180 1142->1145 1146 5b4b5b-5b4b65 call 5839b0 1144->1146 1147 5b4825 1144->1147 1145->1144 1152 5b46ec-5b46f3 1145->1152 1146->1137 1153 5b4b6b-5b4b9d call 585060 1146->1153 1147->1136 1154 5b46fa-5b470a call 5f5dee 1152->1154 1155 5b46f5-5b46f8 1152->1155 1185 5b4b9f-5b4ba1 1153->1185 1186 5b4bbd-5b4be3 call 5aa750 1153->1186 1162 5b470c-5b470f 1154->1162 1163 5b4711-5b4714 1154->1163 1156 5b4716-5b4725 1155->1156 1158 5b472c-5b473e call 5f5dee 1156->1158 1159 5b4727-5b472a 1156->1159 1172 5b4740-5b4743 1158->1172 1173 5b4745-5b4748 1158->1173 1164 5b474a-5b4766 1159->1164 1162->1156 1163->1156 1167 5b47b8-5b47c2 1164->1167 1168 5b4768-5b477c call 5f46af 1164->1168 1170 5b47c8-5b47e5 GetCurrentProcess 1167->1170 1171 5b484e-5b4850 1167->1171 1183 5b477e-5b47b2 GetModuleHandleW GetProcAddress call 5f465e 1168->1183 1184 5b47b5 1168->1184 1176 5b47f8-5b47fe 1170->1176 1201 5b47e7-5b47f0 1170->1201 1171->1176 1177 5b4852-5b4858 1171->1177 1172->1164 1173->1164 1176->1132 1182 5b4804-5b4818 1176->1182 1177->1132 1180 5b485e-5b486c 1177->1180 1180->1136 1188 5b481a-5b481d 1182->1188 1189 5b486e-5b487e call 5f5dee 1182->1189 1183->1184 1184->1167 1191 5b4ba4-5b4bad 1185->1191 1186->1147 1199 5b4be9-5b4c00 1186->1199 1195 5b488c-5b489b 1188->1195 1206 5b4880-5b4883 1189->1206 1207 5b4885-5b488a 1189->1207 1191->1191 1197 5b4baf-5b4bb8 call 585060 1191->1197 1202 5b495f-5b4963 1195->1202 1203 5b48a1-5b48ab call 5839b0 1195->1203 1197->1186 1199->1147 1208 5b481f-5b4823 1201->1208 1209 5b47f2-5b47f6 1201->1209 1204 5b4982-5b49d7 1202->1204 1205 5b4965-5b496b 1202->1205 1203->1137 1217 5b48b1-5b48e8 call 585060 1203->1217 1204->1132 1212 5b49dd-5b49eb 1204->1212 1205->1132 1211 5b4971-5b497c 1205->1211 1206->1195 1207->1195 1208->1147 1208->1176 1209->1147 1209->1176 1211->1136 1211->1204 1215 5b49ed-5b4a05 call 5c7830 1212->1215 1216 5b4a07-5b4a0c 1212->1216 1215->1216 1220 5b4a0e-5b4a10 1216->1220 1221 5b4a12-5b4a15 1216->1221 1217->1132 1235 5b48ee-5b48f9 1217->1235 1223 5b4a2b-5b4a32 1220->1223 1224 5b4a1c-5b4a24 1221->1224 1225 5b4a17-5b4a1a 1221->1225 1227 5b4a37-5b4a3e 1223->1227 1228 5b4a34 1223->1228 1224->1223 1225->1223 1227->1136 1230 5b4a44-5b4a4d call 5839b0 1227->1230 1228->1227 1230->1137 1236 5b4a53-5b4a89 call 585060 1230->1236 1237 5b48fb-5b4900 1235->1237 1238 5b491d-5b4943 call 5aa750 1235->1238 1236->1132 1250 5b4a8f-5b4aa0 1236->1250 1239 5b4903-5b490c 1237->1239 1238->1202 1246 5b4945-5b495c 1238->1246 1239->1239 1242 5b490e-5b4918 call 585060 1239->1242 1242->1238 1246->1202 1252 5b4aa2 1250->1252 1253 5b4ae1 1250->1253 1255 5b4ada-5b4adf 1252->1255 1256 5b4aa9-5b4aae 1252->1256 1257 5b4abe-5b4ac3 1252->1257 1258 5b4acc-5b4ad1 1252->1258 1259 5b4ad3-5b4ad8 1252->1259 1260 5b4ab0-5b4ab5 1252->1260 1261 5b4ab7-5b4abc 1252->1261 1262 5b4ac5-5b4aca 1252->1262 1254 5b4ae6-5b4aeb 1253->1254 1263 5b4af0-5b4af9 1254->1263 1255->1254 1256->1254 1257->1254 1258->1254 1259->1254 1260->1254 1261->1254 1262->1254 1263->1263 1264 5b4afb-5b4b2f call 585060 call 5aa750 1263->1264 1264->1136 1269 5b4b35-5b4b49 1264->1269 1269->1136
                                                                                  APIs
                                                                                    • Part of subcall function 005C5180: GetSystemDefaultLangID.KERNEL32(5D2E80A5,00000000,?,?,?,5D2E80A5), ref: 005C51B7
                                                                                  • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,00000000,00000000), ref: 005B478F
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 005B4796
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 005B47D0
                                                                                  Strings
                                                                                  • he, xrefs: 005B4BC0
                                                                                  • IsWow64Process2, xrefs: 005B4785
                                                                                  • Wrong OS or Os language for:, xrefs: 005B4B8F
                                                                                  • he, xrefs: 005B4920
                                                                                  • No acceptable version found. It must be downloaded., xrefs: 005B4AB7
                                                                                  • No acceptable version found. It must be installed from package., xrefs: 005B4AB0
                                                                                  • kernel32, xrefs: 005B478A
                                                                                  • Search result:, xrefs: 005B4A76
                                                                                  • No acceptable version found., xrefs: 005B4AD3
                                                                                  • An acceptable version was found., xrefs: 005B4AA9, 005B4AFF, 005B4B00
                                                                                  • Not selected for install., xrefs: 005B4ADA
                                                                                  • Searching for:, xrefs: 005B48D5
                                                                                  • No acceptable version found. Operating System not supported., xrefs: 005B4AC5
                                                                                  • No acceptable version found. It is already downloaded and it will be installed., xrefs: 005B4ACC
                                                                                  • he, xrefs: 005B4B0C
                                                                                  • No acceptable version found. It must be downloaded manually from a site., xrefs: 005B4ABE
                                                                                  • Undefined, xrefs: 005B4AE1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCurrentDefaultHandleLangModuleProcProcessSystem
                                                                                  • String ID: An acceptable version was found.$IsWow64Process2$No acceptable version found.$No acceptable version found. It is already downloaded and it will be installed.$No acceptable version found. It must be downloaded manually from a site.$No acceptable version found. It must be downloaded.$No acceptable version found. It must be installed from package.$No acceptable version found. Operating System not supported.$Not selected for install.$Search result:$Searching for:$Undefined$Wrong OS or Os language for:$he$he$he$kernel32
                                                                                  • API String ID: 323535258-4201337374
                                                                                  • Opcode ID: d7556a49568edbebe6c9423ebedf72d1c5c3712f0d3e9376a67fde7a12939fe2
                                                                                  • Instruction ID: 9c3b97853ff79a201ad70ac7f4d9f96b5f7a599942758a97beda9c77e4f29be9
                                                                                  • Opcode Fuzzy Hash: d7556a49568edbebe6c9423ebedf72d1c5c3712f0d3e9376a67fde7a12939fe2
                                                                                  • Instruction Fuzzy Hash: 480280749006059FDB24DF68C858AAEBFB6FF44314F248259E912A7392DB30BD46CF80

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1516 584450-5844bc 1517 5844f9-584500 1516->1517 1518 5844be-5844d2 call 5f46af 1516->1518 1519 584506 call 5a4710 1517->1519 1520 584737-584773 call 582040 call 5f43af 1517->1520 1518->1517 1527 5844d4-5844f6 call 5f494f call 5f465e 1518->1527 1525 58450b-58450d 1519->1525 1528 584513-58451e 1525->1528 1529 584656-584668 GetTempPathW 1525->1529 1527->1517 1533 58456a-584578 1528->1533 1534 584520-584525 call 5f46af 1528->1534 1532 58466a-58466c 1529->1532 1532->1520 1537 584672-584699 1532->1537 1539 58457a-58458c 1533->1539 1540 58458e-5845b2 GetWindowsDirectoryW call 5f9b95 1533->1540 1545 58452a-584534 1534->1545 1544 5846a0-5846a9 1537->1544 1550 5845b5-5845c4 PathFileExistsW 1539->1550 1540->1550 1544->1544 1547 5846ab-5846e7 call 583c00 call 586bc0 1544->1547 1545->1533 1548 584536-584567 GetModuleHandleW GetProcAddress call 5f465e 1545->1548 1562 5846e9-5846fe 1547->1562 1563 58471a-584730 1547->1563 1548->1533 1550->1532 1554 5845ca-58460f call 5a4920 call 5a4b10 * 2 call 5a5090 1550->1554 1578 584611-58463f CreateDirectoryW 1554->1578 1579 584645-584654 call 5a49c0 1554->1579 1565 584710-584717 call 5f43bd 1562->1565 1566 584700-58470e 1562->1566 1563->1520 1565->1563 1566->1565 1568 584774-584849 call 5f98af call 584450 call 582040 call 5843b0 call 584850 call 5843b0 call 5f43af 1566->1568 1578->1579 1579->1532
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W), ref: 00584547
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0058454E
                                                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104,5D2E80A5,00000000), ref: 00584594
                                                                                  • PathFileExistsW.SHLWAPI(?), ref: 005845BC
                                                                                  • CreateDirectoryW.KERNEL32(?,?,S-1-5-32-544,?,00000001,S-1-5-18,?,00000001), ref: 0058463F
                                                                                    • Part of subcall function 005F46AF: AcquireSRWLockExclusive.KERNEL32(0064FFB8,?,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46BA
                                                                                    • Part of subcall function 005F46AF: ReleaseSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46F4
                                                                                  • GetTempPathW.KERNEL32(00000104,?,5D2E80A5,00000000), ref: 00584662
                                                                                    • Part of subcall function 005F465E: AcquireSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583AC7,00650848,00626460), ref: 005F4668
                                                                                    • Part of subcall function 005F465E: ReleaseSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583AC7,00650848,00626460), ref: 005F469B
                                                                                    • Part of subcall function 005F465E: WakeAllConditionVariable.KERNEL32(0064FFB4,?,?,00583AC7,00650848,00626460), ref: 005F46A6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExclusiveLock$AcquireDirectoryPathRelease$AddressConditionCreateExistsFileHandleModuleProcTempVariableWakeWindows
                                                                                  • String ID: d$GetTempPath2W$Kernel32.dll$S-1-5-18$S-1-5-32-544$URL$\SystemTemp\
                                                                                  • API String ID: 3143601600-1600086137
                                                                                  • Opcode ID: a89f610c213eaadeeb73e210c5bf3cc961e562c653d783278b9c9fc6d1775398
                                                                                  • Instruction ID: 6c302a3b66bbec2c259e3a8d316e4c6848f6bad8b8d75862d38344912ffb566d
                                                                                  • Opcode Fuzzy Hash: a89f610c213eaadeeb73e210c5bf3cc961e562c653d783278b9c9fc6d1775398
                                                                                  • Instruction Fuzzy Hash: 47B1E3B1D00219DBDB20EFA4DC59B9EBBB5FF45310F100299E909A7291EB746E44CF51

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1848 5ba610-5ba641 1849 5ba7be-5ba7cf 1848->1849 1850 5ba647-5ba661 GetActiveWindow 1848->1850 1851 5ba66f-5ba677 1850->1851 1852 5ba663-5ba665 call 5bba50 1850->1852 1854 5ba679-5ba683 call 5f1f2a 1851->1854 1855 5ba692-5ba6a1 call 5f202c 1851->1855 1857 5ba66a KiUserCallbackDispatcher 1852->1857 1854->1855 1861 5ba685-5ba68d SetLastError 1854->1861 1862 5ba7d2-5ba837 call 59fae0 call 5baa70 1855->1862 1863 5ba6a7-5ba70c GetCurrentThreadId EnterCriticalSection LeaveCriticalSection CreateDialogParamW 1855->1863 1857->1851 1864 5ba712-5ba729 GetCurrentThreadId 1861->1864 1876 5ba839-5ba849 1862->1876 1877 5ba84d-5ba86c call 59e820 1862->1877 1863->1864 1868 5ba72b-5ba732 1864->1868 1869 5ba799-5ba7b8 SetWindowTextW GetDlgItem SetWindowTextW 1864->1869 1871 5ba745-5ba780 call 5a9b20 call 599d40 1868->1871 1872 5ba734-5ba740 call 58c850 call 5af8e0 1868->1872 1869->1849 1871->1869 1886 5ba782-5ba796 1871->1886 1872->1871 1876->1877 1886->1869
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 005BA64A
                                                                                  • SetLastError.KERNEL32(0000000E), ref: 005BA687
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 005BA712
                                                                                  • SetWindowTextW.USER32(?,00000000), ref: 005BA79E
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 005BA7AC
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 005BA7B8
                                                                                    • Part of subcall function 005BBA50: GetDlgItem.USER32(?,00000002), ref: 005BBA6D
                                                                                    • Part of subcall function 005BBA50: GetWindowRect.USER32(00000000,?), ref: 005BBA83
                                                                                    • Part of subcall function 005BBA50: ShowWindow.USER32(00000000,00000000,?,?,?,?,005BA66A), ref: 005BBA98
                                                                                    • Part of subcall function 005BBA50: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,005BA66A), ref: 005BBAA3
                                                                                    • Part of subcall function 005BBA50: GetDlgItem.USER32(?,000003E9), ref: 005BBAB1
                                                                                    • Part of subcall function 005BBA50: GetWindowRect.USER32(00000000,?), ref: 005BBAC7
                                                                                    • Part of subcall function 005BBA50: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,005BA66A), ref: 005BBB06
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemRect$Text$ActiveCurrentErrorInvalidateLastShowThread
                                                                                  • String ID: \,e
                                                                                  • API String ID: 2012338523-2651779263
                                                                                  • Opcode ID: 9253608ee7e31399223fb3a2f229ce2067d4f7ce46bb16c6241b9ce0899f37f8
                                                                                  • Instruction ID: 5369806257ad951a2263233364126595a1a160c83d27cd32b4115d6c9c9e48e6
                                                                                  • Opcode Fuzzy Hash: 9253608ee7e31399223fb3a2f229ce2067d4f7ce46bb16c6241b9ce0899f37f8
                                                                                  • Instruction Fuzzy Hash: 8F71FE31A04705EFDB11DF68DC48B9EBFB6FF05720F148669E825AB291CB74A901CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1911 5baa70-5baab5 1912 5baabe-5bab15 call 5baf10 call 5bb130 call 584450 call 5869b0 1911->1912 1913 5baab7-5baab9 1911->1913 1925 5bab19-5bab22 call 5839b0 1912->1925 1926 5bab17 1912->1926 1914 5baed6-5baef8 call 5f43af 1913->1914 1929 5baef9-5baf03 call 583620 1925->1929 1930 5bab28-5bab45 1925->1930 1926->1925 1935 5bab73 1930->1935 1936 5bab47-5bab4d 1930->1936 1939 5bab75-5bab7a call 585680 1935->1939 1937 5bab4f-5bab5b call 585350 1936->1937 1938 5bab5d-5bab5f 1936->1938 1945 5bab7f-5baba8 call 5843b0 * 2 call 5a61e0 call 5839b0 1937->1945 1941 5bab62-5bab6b 1938->1941 1939->1945 1941->1941 1944 5bab6d-5bab71 1941->1944 1944->1939 1945->1929 1954 5babae-5babe2 GetTempFileNameW 1945->1954 1957 5bacca-5bacd3 call 5839b0 1954->1957 1958 5babe8-5babee 1954->1958 1957->1929 1963 5bacd9-5bad1b call 599d40 call 5839b0 1957->1963 1960 5babf0-5babf9 1958->1960 1960->1960 1962 5babfb-5bac15 call 585680 DeleteFileW call 5839b0 1960->1962 1968 5bac1a-5bac1e 1962->1968 1963->1929 1977 5bad21-5bad66 call 599d40 CopyFileW 1963->1977 1968->1929 1970 5bac24-5bac4c 1968->1970 1978 5bac59-5bac60 call 585680 1970->1978 1979 5bac4e-5bac57 call 585350 1970->1979 1994 5badfc 1977->1994 1995 5bad6c-5badba call 5a6400 call 5ba920 call 5ce3a0 1977->1995 1984 5bac65-5bac7d call 5f5d4b 1978->1984 1979->1984 1989 5bac7f-5bac86 1984->1989 1990 5baca3-5bacb4 1984->1990 1989->1990 1993 5bac88-5bac9e call 59e730 call 585060 1989->1993 1990->1957 1991 5bacb6-5bacc6 1990->1991 1991->1957 1993->1990 1999 5bae00-5bae14 1994->1999 2020 5badbc-5badcc 1995->2020 2021 5badd0-5bade4 1995->2021 2003 5bae2a-5bae3e 1999->2003 2004 5bae16-5bae26 1999->2004 2005 5bae40-5bae50 2003->2005 2006 5bae54-5bae68 2003->2006 2004->2003 2005->2006 2008 5bae6a-5bae7a 2006->2008 2009 5bae7e-5bae92 2006->2009 2008->2009 2013 5baea8-5baebd 2009->2013 2014 5bae94-5baea4 2009->2014 2016 5baebf-5baecf 2013->2016 2017 5baed3 2013->2017 2014->2013 2016->2017 2017->1914 2020->2021 2021->1999 2024 5bade6-5badfa 2021->2024 2024->1999
                                                                                  APIs
                                                                                  • GetTempFileNameW.KERNELBASE(?,AI_,00000000,?,?,?,?,?,?,?,?,?,?,0061F0F5,000000FF), ref: 005BABD7
                                                                                  • DeleteFileW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0061F0F5,000000FF), ref: 005BAC0F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$DeleteNameTemp
                                                                                  • String ID: %s -paths %s -retry_count %d$-NoProfile -NonInteractive -NoLogo -ExecutionPolicy %s -Command "%s"$.ps1$AI_$RemoteSigned
                                                                                  • API String ID: 1648863064-656004915
                                                                                  • Opcode ID: e4bba5cfb4e31a549c86190a47ebcbc4c935bda809488248cb3a6876dbd5a079
                                                                                  • Instruction ID: 78ae20e17a9f93be2e06d70a050ebaf40a7d098adabcfdc6ccd7f4778f4ff1c3
                                                                                  • Opcode Fuzzy Hash: e4bba5cfb4e31a549c86190a47ebcbc4c935bda809488248cb3a6876dbd5a079
                                                                                  • Instruction Fuzzy Hash: B6E1C631A0064ADFDB05EF68CC59AADBFB5FF84320F188158E815A7391DB34AE05DB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2038 5f1cbc-5f1cc7 2039 5f1cc9-5f1cd5 DecodePointer 2038->2039 2040 5f1cd6-5f1ced LoadLibraryExA 2038->2040 2041 5f1cef-5f1d04 call 5f1d6c 2040->2041 2042 5f1d67 2040->2042 2041->2042 2046 5f1d06-5f1d1b call 5f1d6c 2041->2046 2043 5f1d69-5f1d6b 2042->2043 2046->2042 2049 5f1d1d-5f1d32 call 5f1d6c 2046->2049 2049->2042 2052 5f1d34-5f1d49 call 5f1d6c 2049->2052 2052->2042 2055 5f1d4b-5f1d65 DecodePointer 2052->2055 2055->2043
                                                                                  APIs
                                                                                  • DecodePointer.KERNEL32(?,?,?,005F2002,0064F82C,?,?,?,005CD485,00000000,5D2E80A5,?), ref: 005F1CCE
                                                                                  • LoadLibraryExA.KERNELBASE(atlthunk.dll,00000000,00000800,?,?,?,005F2002,0064F82C,?,?,?,005CD485,00000000,5D2E80A5,?), ref: 005F1CE3
                                                                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 005F1D5F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: DecodePointer$LibraryLoad
                                                                                  • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                                                                                  • API String ID: 1423960858-1745123996
                                                                                  • Opcode ID: 0dbf0232bb01de8791e340b1321986d1840e07ff46da1895f52526400b069d03
                                                                                  • Instruction ID: c46418e57d6e974e89018b72deae39e10d8077dacc93889380c7a9a9556873e8
                                                                                  • Opcode Fuzzy Hash: 0dbf0232bb01de8791e340b1321986d1840e07ff46da1895f52526400b069d03
                                                                                  • Instruction Fuzzy Hash: E001C834651A1CFBCB216710AC07FF93F76AF42754F050060BD44EA192D7A69609C5D9
                                                                                  APIs
                                                                                  • GetFileVersionInfoSizeW.KERNELBASE(?,?,5D2E80A5,00000000,?,?,00000000,0061CCC5,000000FF,?,005BA745), ref: 005AF945
                                                                                  • GetFileVersionInfoW.KERNELBASE(?,?,00000000,005BA745,00000000,?,00000000,0061CCC5,000000FF,?,005BA745), ref: 005AF993
                                                                                  • VerQueryValueW.VERSION(005BA745,\VarFileInfo\Translation,0061CCC5,000000FF,?,00000000,0061CCC5,000000FF,?,005BA745), ref: 005AF9DB
                                                                                  • VerQueryValueW.VERSION(005BA745,?,?,00000000,?,?,?,?,?,00000000,0061CCC5,000000FF,?,005BA745), ref: 005AFA3A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileInfoQueryValueVersion$Size
                                                                                  • String ID: ProductName$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                                                                                  • API String ID: 2099394744-2149928195
                                                                                  • Opcode ID: 46cb6ac3cacbdb57829ac39261964ec0a98f98f5e41071b3091e0f9eed21f985
                                                                                  • Instruction ID: 960475522b533cbf3948e6d42fb0fa12a9c9d73658f5f3625b9db61e6235cf7e
                                                                                  • Opcode Fuzzy Hash: 46cb6ac3cacbdb57829ac39261964ec0a98f98f5e41071b3091e0f9eed21f985
                                                                                  • Instruction Fuzzy Hash: AF71B030A0060ADFCF14DFA8C899AEEBFB9FF45314F144169E916A7291DB349D05CBA1
                                                                                  APIs
                                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 005A7D54
                                                                                  • GetLastError.KERNEL32 ref: 005A7D65
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 005A7D7B
                                                                                  • GetExitCodeProcess.KERNELBASE(00000000,00000000), ref: 005A7D8C
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005A7D9A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCodeErrorExecuteExitHandleLastObjectProcessShellSingleWait
                                                                                  • String ID: Nc
                                                                                  • API String ID: 1481985272-1584449269
                                                                                  • Opcode ID: 31cb863c208035671ea6e3aeb379e8c46174765c86c821a76639440b0e7e6b87
                                                                                  • Instruction ID: ba41b9567cfacf30b56b2bc432262e8bc0f1f7af4959f3b82ffc984adc426373
                                                                                  • Opcode Fuzzy Hash: 31cb863c208035671ea6e3aeb379e8c46174765c86c821a76639440b0e7e6b87
                                                                                  • Instruction Fuzzy Hash: 88617B71A04619CFDB14CF68C858BAEBBB5FF49324F148259E825A73D0DB74AD05CB90
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,00000002), ref: 005BBA6D
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005BBA83
                                                                                  • ShowWindow.USER32(00000000,00000000,?,?,?,?,005BA66A), ref: 005BBA98
                                                                                  • InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,005BA66A), ref: 005BBAA3
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 005BBAB1
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005BBAC7
                                                                                  • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,005BA66A), ref: 005BBB06
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rect$Item$InvalidateShow
                                                                                  • String ID:
                                                                                  • API String ID: 2147159307-0
                                                                                  • Opcode ID: 94ab6acbe03f1db6c79b3a12fe85f31478677812b96ffa2a36fd56b539b1344e
                                                                                  • Instruction ID: af03f5e3eee58e0f3b941a628bbcf411f06d60abfffbd11a2bca557f1901369c
                                                                                  • Opcode Fuzzy Hash: 94ab6acbe03f1db6c79b3a12fe85f31478677812b96ffa2a36fd56b539b1344e
                                                                                  • Instruction Fuzzy Hash: A2219D71618701AFE310DF34DC4AEABBBE9FF89B00F008619F855D2190E770AD518B92
                                                                                  APIs
                                                                                  • EndDialog.USER32 ref: 005C411A
                                                                                    • Part of subcall function 005CCA00: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 005CCA3E
                                                                                    • Part of subcall function 005CCA00: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005CCA4D
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(?,000000F0), ref: 005BBEE7
                                                                                    • Part of subcall function 005BBEA0: GetParent.USER32(00000000), ref: 005BBEFA
                                                                                    • Part of subcall function 005BBEA0: GetWindowRect.USER32(?,?), ref: 005BBF13
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 005BBF26
                                                                                    • Part of subcall function 005BBEA0: MonitorFromWindow.USER32(?,00000002), ref: 005BBF3E
                                                                                    • Part of subcall function 005BBEA0: GetMonitorInfoW.USER32(00000000,?), ref: 005BBF54
                                                                                  • SetWindowTextW.USER32(?,?), ref: 005C4031
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                    • Part of subcall function 00585350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0059E648,-00000010), ref: 00585373
                                                                                  • GetDlgItem.USER32(00000001,0000040A), ref: 005C407B
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 005C4086
                                                                                    • Part of subcall function 005D4D20: GetWindowLongW.USER32(?,000000F0), ref: 005D4D35
                                                                                    • Part of subcall function 005D4D20: GetParent.USER32(?), ref: 005D4D43
                                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000444A0,?,00000000,?), ref: 005C40AA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$MessageMonitorParentSendText$CreateDialogFindFromHeapInfoItemProcessRectResourceThread
                                                                                  • String ID:
                                                                                  • API String ID: 758803202-0
                                                                                  • Opcode ID: 86cad2e9777f4f8323c741a6f77f187a5f8da9dfa413e638f6d303d0664c974f
                                                                                  • Instruction ID: 79317066094df85e91b34549c1a2a9daab924941696901919c5d1faac866ef0d
                                                                                  • Opcode Fuzzy Hash: 86cad2e9777f4f8323c741a6f77f187a5f8da9dfa413e638f6d303d0664c974f
                                                                                  • Instruction Fuzzy Hash: 8F51EE72A0460AAFD710DF98DC45FAABBA4FB58320F04422AED15D7790DB75A950CFE0
                                                                                  APIs
                                                                                  • MsgWaitForMultipleObjectsEx.USER32(00000001,000000FF,000000FF,000005FF,00000004), ref: 005A7A17
                                                                                  • PeekMessageW.USER32(?,00000000), ref: 005A7A48
                                                                                  • TranslateMessage.USER32(00000000), ref: 005A7A57
                                                                                  • DispatchMessageW.USER32(00000000), ref: 005A7A62
                                                                                  • MsgWaitForMultipleObjectsEx.USER32(00000001,00000000,000000FF,000005FF,00000004), ref: 005A7A78
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$MultipleObjectsWait$DispatchPeekTranslate
                                                                                  • String ID:
                                                                                  • API String ID: 4084795276-0
                                                                                  • Opcode ID: 67d73a270629087924628a6b192e9a0ffd11fd07f23891fd33992a6e81160d03
                                                                                  • Instruction ID: 43198b4ece2dc6d4691e7c2c186f09c215ff1ea062f1899deeffe9a03fd21e71
                                                                                  • Opcode Fuzzy Hash: 67d73a270629087924628a6b192e9a0ffd11fd07f23891fd33992a6e81160d03
                                                                                  • Instruction Fuzzy Hash: 0101F170A883057BE720CF608C45F6E7BE8BB5DB20F005618BA14D10C0E770C6849B22
                                                                                  APIs
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?,5D2E80A5,?,00000000,?,0061EFEE,000000FF), ref: 005BA975
                                                                                  • PathAppendW.SHLWAPI(00000000,WindowsPowerShell\v1.0\powershell.exe), ref: 005BA98C
                                                                                  • PathFileExistsW.KERNELBASE(00000000), ref: 005BA99A
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                    • Part of subcall function 00585350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0059E648,-00000010), ref: 00585373
                                                                                  Strings
                                                                                  • WindowsPowerShell\v1.0\powershell.exe, xrefs: 005BA983
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$AppendExistsFileFindFolderHeapProcessResource
                                                                                  • String ID: WindowsPowerShell\v1.0\powershell.exe
                                                                                  • API String ID: 2424349261-2665178159
                                                                                  • Opcode ID: 1e55e860f0a6c7d71dd98f47d53a676bb007294502b8d634cdac6153552a65bf
                                                                                  • Instruction ID: c9bd4187149aae58a806e06f53709616db85c3732ecda9a0cf104843e4ce30b3
                                                                                  • Opcode Fuzzy Hash: 1e55e860f0a6c7d71dd98f47d53a676bb007294502b8d634cdac6153552a65bf
                                                                                  • Instruction Fuzzy Hash: 7D51F5756006499FDB20EF68CC49BEE7BA9FB44710F104529F916DB381EB34AA04CB61
                                                                                  APIs
                                                                                  • VirtualProtect.KERNELBASE(00657000,00000080,00000004,00000000,?,?,00607268,0000001A,AppPolicyGetProcessTerminationMethod,0062D708,AppPolicyGetProcessTerminationMethod,00000000,?,0060986F,00000000), ref: 00607176
                                                                                  • VirtualProtect.KERNELBASE(00657000,00000080,00000002,00000000,?,?,00607268,0000001A,AppPolicyGetProcessTerminationMethod,0062D708,AppPolicyGetProcessTerminationMethod,00000000,?,0060986F,00000000), ref: 0060719E
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,00607268,0000001A,AppPolicyGetProcessTerminationMethod,0062D708,AppPolicyGetProcessTerminationMethod,00000000,?,0060986F,00000000), ref: 006071C0
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 006071CA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProtectVirtual$AddressFreeLibraryProc
                                                                                  • String ID:
                                                                                  • API String ID: 3998452802-0
                                                                                  • Opcode ID: 756f49e3224d6e493d37d9081aee120a6a60775cae1b06bcc15f9f8b2c14e133
                                                                                  • Instruction ID: 1c360a2d30bea857faecd707abd4c4f6b4b2d3bc51f0b70583f0a48c2395f6d2
                                                                                  • Opcode Fuzzy Hash: 756f49e3224d6e493d37d9081aee120a6a60775cae1b06bcc15f9f8b2c14e133
                                                                                  • Instruction Fuzzy Hash: 9F212F32A48125ABDB3A8F68DC45E9B379AEF41770F280165FD15973D0DA30ED01C6A4
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 005BB9E9
                                                                                  • DestroyWindow.USER32(?), ref: 005BB9F8
                                                                                  • PostMessageW.USER32(?,00000401,00000000,00000000), ref: 005BBA15
                                                                                  • IsWindow.USER32(?), ref: 005BBA23
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CurrentDestroyMessagePostThread
                                                                                  • String ID:
                                                                                  • API String ID: 3186974096-0
                                                                                  • Opcode ID: bc7857fad2e42616d2932da0f765bf5a7baa97a05ff069be484a3adb6cbf7aa4
                                                                                  • Instruction ID: d8b75fa6aa99929889d8c7e78694a653bd5a57869c1ad90351d9fbe923aeca82
                                                                                  • Opcode Fuzzy Hash: bc7857fad2e42616d2932da0f765bf5a7baa97a05ff069be484a3adb6cbf7aa4
                                                                                  • Instruction Fuzzy Hash: 36F08C3041AB409FE7319B24EE08B92BFE2BF08B00F44694CE48696A90C7F0F841CB58
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,5D2E80A5), ref: 005C04E0
                                                                                  • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 005C0528
                                                                                  • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,0000000C,?), ref: 005C0579
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open$InfoQuery
                                                                                  • String ID:
                                                                                  • API String ID: 223210943-0
                                                                                  • Opcode ID: 8e1a0c64e35ed7615edc02de7878d60379c52f3e5d4d44f078e830e5b5c33bb3
                                                                                  • Instruction ID: 6f6d98c26b3122b9282a106678de3b3a1c907ba8f6e1db67f45bd1643e7777b5
                                                                                  • Opcode Fuzzy Hash: 8e1a0c64e35ed7615edc02de7878d60379c52f3e5d4d44f078e830e5b5c33bb3
                                                                                  • Instruction Fuzzy Hash: 8821A071A40209EFEB10DF84DD41FAAFBB9FB04720F10012AFA14A72C0D7B1A914CBA1
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 0059F6B7
                                                                                  • DefWindowProcW.USER32(00000000,00000000,00000000,00000000,?,?,?,?,0061A415,000000FF), ref: 0059F6D2
                                                                                    • Part of subcall function 0059F980: GetCurrentThreadId.KERNEL32 ref: 0059F9E5
                                                                                    • Part of subcall function 0059F7F0: EnterCriticalSection.KERNEL32(00650A1C,5D2E80A5), ref: 0059F82F
                                                                                    • Part of subcall function 0059F7F0: DestroyWindow.USER32(00000000), ref: 0059F84D
                                                                                    • Part of subcall function 0059F7F0: LeaveCriticalSection.KERNEL32(00650A1C), ref: 0059F896
                                                                                  • CoUninitialize.COMBASE ref: 0059F715
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionWindow$CurrentDestroyEnterInitializeLeaveProcThreadUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 2072714735-0
                                                                                  • Opcode ID: 72a886914263af283fef4bb28813f7d2e7b57b3bb4a32089f360781f218f0049
                                                                                  • Instruction ID: eb4f3b0be8d8d321d1c961699a72a40fc59cbdf7c98f8c7db87360e3e1ece1e3
                                                                                  • Opcode Fuzzy Hash: 72a886914263af283fef4bb28813f7d2e7b57b3bb4a32089f360781f218f0049
                                                                                  • Instruction Fuzzy Hash: A1118231A55288BFEB20EFA8DD09BDD7BA4FF05710F104159F819972D1DB742604CB92
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,0000040B), ref: 005C429D
                                                                                  • SendMessageW.USER32(00000000,00000401,00000000), ref: 005C42B8
                                                                                  • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 005C42C8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Item
                                                                                  • String ID:
                                                                                  • API String ID: 3888421826-0
                                                                                  • Opcode ID: 763e3f2a84824009e10225721cc63a97d173763ed9f3bc05fd39b0e1275c8d94
                                                                                  • Instruction ID: 85a047a2136108c0033199cf6e140ce5ee14d5b8ae8ad1af52123a471491e3a4
                                                                                  • Opcode Fuzzy Hash: 763e3f2a84824009e10225721cc63a97d173763ed9f3bc05fd39b0e1275c8d94
                                                                                  • Instruction Fuzzy Hash: 39F06CB12447106FF760DF159C49F567699EF88750F218115F700E92D5C3F558029B68
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(?,?,0060419D,?,?,005F96A2), ref: 006041B1
                                                                                  • TerminateProcess.KERNEL32(00000000,?,0060419D,?,?,005F96A2), ref: 006041B8
                                                                                  • ExitProcess.KERNEL32 ref: 006041CA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 1703294689-0
                                                                                  • Opcode ID: 8c39c3eedb2a718c1d8ee23f6aded8a253347c8932ed33292b98b8007a1e7ac5
                                                                                  • Instruction ID: 9cac10e8e166a436b8b1391b75e1c6b4c4af00bd2c7feaae223277c29c12e1e2
                                                                                  • Opcode Fuzzy Hash: 8c39c3eedb2a718c1d8ee23f6aded8a253347c8932ed33292b98b8007a1e7ac5
                                                                                  • Instruction Fuzzy Hash: B9D05EB1008648BBCB262F60DD0DED93F67EF00301F048094BA09440B0CF3189E6CB84
                                                                                  APIs
                                                                                  • SetWindowLongW.USER32(?,00000000,?), ref: 005BBC0E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongWindow
                                                                                  • String ID: $
                                                                                  • API String ID: 1378638983-3993045852
                                                                                  • Opcode ID: ddc8374bf28bab28e6663ce91512eddf682ccdcba1ec345882538684b9474d41
                                                                                  • Instruction ID: 135c31080367d940161ca44e116013a38b0120ce411f613f26e8b6e3f8578d79
                                                                                  • Opcode Fuzzy Hash: ddc8374bf28bab28e6663ce91512eddf682ccdcba1ec345882538684b9474d41
                                                                                  • Instruction Fuzzy Hash: E43143712083499FEB10CF19C885BAABFF4FB88710F044919F945872A0C7F5ED488B92
                                                                                  APIs
                                                                                  • RegEnumValueA.KERNELBASE(?,?,?,?,00000000,?,00000000,?,5D2E80A5), ref: 005C06C8
                                                                                  • RegEnumValueA.ADVAPI32(?,?,?,?,00000000,?,?,?,?), ref: 005C06F8
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                    • Part of subcall function 0058CB10: FindResourceW.KERNEL32(00000000,00000100,00000006,00000000,000000FF,?,00000000,005BA070,000000FF,?,?,?,5D2E80A5,00000000,?,000000FF), ref: 0058CB4D
                                                                                    • Part of subcall function 0058CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,?,5D2E80A5,00000000,?,000000FF), ref: 0058CB7E
                                                                                    • Part of subcall function 0058CB10: WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,?,00000000,00000000,00000000,?,?,?,5D2E80A5,00000000,?,000000FF,000000FF), ref: 0058CBB5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharEnumMultiValueWide$FindHeapProcessResource
                                                                                  • String ID:
                                                                                  • API String ID: 4070800961-0
                                                                                  • Opcode ID: 2ac6294dfbda3ace1cdd978a87eeb81865f83386ad69975fea08491d8cf31cc0
                                                                                  • Instruction ID: 6e854848a92f17c195498f61b85690c3633958ceb211025aa40df3987ef229d3
                                                                                  • Opcode Fuzzy Hash: 2ac6294dfbda3ace1cdd978a87eeb81865f83386ad69975fea08491d8cf31cc0
                                                                                  • Instruction Fuzzy Hash: C9B1B371A00649DFDB04DF98C894BAEBBB9FF48320F144169E915A7391DB34AE05CFA1
                                                                                  APIs
                                                                                  • IsWindow.USER32(00000000), ref: 005CD512
                                                                                  • EndDialog.USER32(00000000,00000001), ref: 005CD521
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: DialogWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2634769047-0
                                                                                  • Opcode ID: 01d60314b14b5d1b7914f183a32a55d1a0288379fb1757843e81f0d4cac06158
                                                                                  • Instruction ID: edf8a56a48b098121e8ae47c43ef8163c168736424978f8236c8614f567f7397
                                                                                  • Opcode Fuzzy Hash: 01d60314b14b5d1b7914f183a32a55d1a0288379fb1757843e81f0d4cac06158
                                                                                  • Instruction Fuzzy Hash: B0619B70A01644DFCB05DF68C948B58BFB5BF09324F1582ADE819EB391CB74AE01CBA1
                                                                                  APIs
                                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 005A7D54
                                                                                  • GetLastError.KERNEL32 ref: 005A7D65
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 005A7D7B
                                                                                  • GetExitCodeProcess.KERNELBASE(00000000,00000000), ref: 005A7D8C
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005A7D9A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCodeErrorExecuteExitHandleLastObjectProcessShellSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 1481985272-0
                                                                                  • Opcode ID: 4956876183523fcd67b0c25d998cd397ab6a6e2f25f8afaa6095ccb0005f1f58
                                                                                  • Instruction ID: c3da14bd04ed6409c339e3b3c8ead0a767d57d8216a7eb9342b51c5cebaeefcb
                                                                                  • Opcode Fuzzy Hash: 4956876183523fcd67b0c25d998cd397ab6a6e2f25f8afaa6095ccb0005f1f58
                                                                                  • Instruction Fuzzy Hash: 4B41A071A05A4A8BDB15CF68CC5426DBBB1FF8A330F188359E825A73D1D734AD02CB91
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID: Tsc
                                                                                  • API String ID: 2962429428-1146963369
                                                                                  • Opcode ID: ddfde97f7024d7a62ea324424331258c17f9ab29f1e136bc0a470ca838366812
                                                                                  • Instruction ID: ff445748e575b5cb71259f21a211895793f0a7d32f04ffdc857a3d85fa789ed9
                                                                                  • Opcode Fuzzy Hash: ddfde97f7024d7a62ea324424331258c17f9ab29f1e136bc0a470ca838366812
                                                                                  • Instruction Fuzzy Hash: C1218E74A05645EFDB14CFA9D945F5ABBB8FF08720F14029DE815D7390C770A904CBA1
                                                                                  APIs
                                                                                  • EnableWindow.USER32(?,00000000), ref: 005BB7F1
                                                                                    • Part of subcall function 005CCA00: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 005CCA3E
                                                                                    • Part of subcall function 005CCA00: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005CCA4D
                                                                                    • Part of subcall function 005BBA50: GetDlgItem.USER32(?,00000002), ref: 005BBA6D
                                                                                    • Part of subcall function 005BBA50: GetWindowRect.USER32(00000000,?), ref: 005BBA83
                                                                                    • Part of subcall function 005BBA50: ShowWindow.USER32(00000000,00000000,?,?,?,?,005BA66A), ref: 005BBA98
                                                                                    • Part of subcall function 005BBA50: InvalidateRect.USER32(00000000,00000000,00000001,?,?,?,?,005BA66A), ref: 005BBAA3
                                                                                    • Part of subcall function 005BBA50: GetDlgItem.USER32(?,000003E9), ref: 005BBAB1
                                                                                    • Part of subcall function 005BBA50: GetWindowRect.USER32(00000000,?), ref: 005BBAC7
                                                                                    • Part of subcall function 005BBA50: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,?,?,?,005BA66A), ref: 005BBB06
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(?,000000F0), ref: 005BBEE7
                                                                                    • Part of subcall function 005BBEA0: GetParent.USER32(00000000), ref: 005BBEFA
                                                                                    • Part of subcall function 005BBEA0: GetWindowRect.USER32(?,?), ref: 005BBF13
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 005BBF26
                                                                                    • Part of subcall function 005BBEA0: MonitorFromWindow.USER32(?,00000002), ref: 005BBF3E
                                                                                    • Part of subcall function 005BBEA0: GetMonitorInfoW.USER32(00000000,?), ref: 005BBF54
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rect$ItemLongMessageMonitorSend$EnableFromInfoInvalidateParentShow
                                                                                  • String ID:
                                                                                  • API String ID: 2603943895-0
                                                                                  • Opcode ID: 0a0010316c4823201ba288decdbc845ac6553ee8daf9b024abc6ccd6ab5d30a0
                                                                                  • Instruction ID: 22a2e3150c60b120db89238a711b9876c7e5c3f7a57ec68199cf7cf017d1f371
                                                                                  • Opcode Fuzzy Hash: 0a0010316c4823201ba288decdbc845ac6553ee8daf9b024abc6ccd6ab5d30a0
                                                                                  • Instruction Fuzzy Hash: C11181766101095BE720DF08EC45BE67BA8EB94320F004266FC1587691D7F5E861DBE1
                                                                                  APIs
                                                                                    • Part of subcall function 005A98C0: LoadLibraryW.KERNEL32(ComCtl32.dll,5D2E80A5,00000007,00000007,?), ref: 005A98FA
                                                                                    • Part of subcall function 005A98C0: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 005A9920
                                                                                    • Part of subcall function 005A98C0: FreeLibrary.KERNEL32(00000000), ref: 005A99A9
                                                                                    • Part of subcall function 005A98C0: GetSystemMetrics.USER32(0000000C), ref: 005A9960
                                                                                    • Part of subcall function 005A98C0: GetSystemMetrics.USER32(0000000B), ref: 005A9978
                                                                                    • Part of subcall function 005A98C0: LoadImageW.USER32(?,?,00000001,00000000,00000000,?), ref: 005A998B
                                                                                  • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 005CCA3E
                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005CCA4D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoadMessageMetricsSendSystem$AddressFreeImageProc
                                                                                  • String ID:
                                                                                  • API String ID: 852476325-0
                                                                                  • Opcode ID: 4a27f9ca1173bbb67291e2d2b286d18bb5c953cc615e5c42741f1412a9286b89
                                                                                  • Instruction ID: 150cae8f3d559a148b1f55f7ad1bded996a90cc98f1b468aa778da6d1012ec15
                                                                                  • Opcode Fuzzy Hash: 4a27f9ca1173bbb67291e2d2b286d18bb5c953cc615e5c42741f1412a9286b89
                                                                                  • Instruction Fuzzy Hash: 07F0307278071037F73011695C4BF6B664DE7C6BA1F144265FA95EB2C1ECEA6C0542E8
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32(?,00604615), ref: 0060D823
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,00604615), ref: 0060D862
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentStrings$Free
                                                                                  • String ID:
                                                                                  • API String ID: 3328510275-0
                                                                                  • Opcode ID: 1e8705d8bb5535fc06cbe24e39ceaf31a44a7344fe17e55df00560224ea060ea
                                                                                  • Instruction ID: 3fd60ffa33acba445b4e1c3a50753d585b2f85ae0b46a7db3fa13c236444a09a
                                                                                  • Opcode Fuzzy Hash: 1e8705d8bb5535fc06cbe24e39ceaf31a44a7344fe17e55df00560224ea060ea
                                                                                  • Instruction Fuzzy Hash: 2DE0923B28AA2126D36933B9BC8EEDF1B0BDFC5675715022AF615862C2EE148C0240E5
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000003,00000000,006338A1,000000FF,00000000,00000000,00000000,?,?,005B83BC,006338A1), ref: 005A6168
                                                                                  • MultiByteToWideChar.KERNEL32(00000003,00000000,006338A1,000000FF,?,-00000001,?,005B83BC,006338A1), ref: 005A619A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 626452242-0
                                                                                  • Opcode ID: eff31b046e387e2f66afe5d56219757aca1a5ac9858465a1eb1da270c3482a76
                                                                                  • Instruction ID: 564fc90e14792cdd7c6bc49c900661a24f1e34a023f2ae859179d5073e05cd25
                                                                                  • Opcode Fuzzy Hash: eff31b046e387e2f66afe5d56219757aca1a5ac9858465a1eb1da270c3482a76
                                                                                  • Instruction Fuzzy Hash: 9F01C032301212AFDA10AB49DC99F1EBB5AFFD5721F204119F614EB2D1CA21681187A4
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 005C44C5
                                                                                  • CoUninitialize.OLE32(00000000,?,?,?,00620B9D,000000FF), ref: 005C44F2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 3442037557-0
                                                                                  • Opcode ID: b722f8e27632729dabb46bff228a3533c80a2712f28ccc7b7455576dda5458ac
                                                                                  • Instruction ID: 47ff0fad60282d15b184a165e9d475e4e4d081bcc07f44feb54491cbc303750a
                                                                                  • Opcode Fuzzy Hash: b722f8e27632729dabb46bff228a3533c80a2712f28ccc7b7455576dda5458ac
                                                                                  • Instruction Fuzzy Hash: 7AF06275A08648AFD721CFA8D948F99BFF9FB09710F108699E825872D0CB355900CB50
                                                                                  APIs
                                                                                  • CoInitializeEx.OLE32(00000000,00000000,5D2E80A5,?,?,?,0061922D,000000FF), ref: 0059B005
                                                                                    • Part of subcall function 00598780: SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?), ref: 00598890
                                                                                    • Part of subcall function 005F3148: GetCurrentThreadId.KERNEL32 ref: 005F3173
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentFolderInitializePathThread
                                                                                  • String ID:
                                                                                  • API String ID: 2098070997-0
                                                                                  • Opcode ID: d94a0ca590c30514347847684f64b79444cbdaebf8345517d2a5479a61842d46
                                                                                  • Instruction ID: c41633ab3912eec101110ec4bc1af393d9f8edcb2a55900c7b0c9c821baeab63
                                                                                  • Opcode Fuzzy Hash: d94a0ca590c30514347847684f64b79444cbdaebf8345517d2a5479a61842d46
                                                                                  • Instruction Fuzzy Hash: 9321DE71A00715AFE720DF64DC45F6BBBE9FB49B20F104A1AF92197380DB75A9008BA0
                                                                                  APIs
                                                                                  • VirtualProtect.KERNELBASE(00000000,?,005F1944,0064F7DC,?,?,?,?,?,?,?,?,005F1642,00000000,00000000,00000004), ref: 005F187E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 544645111-0
                                                                                  • Opcode ID: d3a772a63f09208fb7561860e13a227057cc64f9264cf2110be80d9ac2fda026
                                                                                  • Instruction ID: 7c0da1a3f7a4d51a23a937312974e4843044edac2926c8145629c6a6a065ddec
                                                                                  • Opcode Fuzzy Hash: d3a772a63f09208fb7561860e13a227057cc64f9264cf2110be80d9ac2fda026
                                                                                  • Instruction Fuzzy Hash: 9E11B17650060DEADB208E40AA54BBB3F6DFF457A4F24002AFB0167140DB788D019668
                                                                                  APIs
                                                                                  • EndDialog.USER32(?,00000002), ref: 005C432F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Dialog
                                                                                  • String ID:
                                                                                  • API String ID: 1120787796-0
                                                                                  • Opcode ID: d0252a73a25118f0f4d76f8800233fa516c9b48cc984741837f0af32e28e8795
                                                                                  • Instruction ID: 4023fb83885532219506a08200f7f42e137d4bac177ae655ac65db675fa9a877
                                                                                  • Opcode Fuzzy Hash: d0252a73a25118f0f4d76f8800233fa516c9b48cc984741837f0af32e28e8795
                                                                                  • Instruction Fuzzy Hash: D3018B70608602EFC7249F64D808F4ABBA6FF84B05F00852DE808576A1CB70A852DF40
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,0000000C), ref: 005C0472
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID:
                                                                                  • API String ID: 71445658-0
                                                                                  • Opcode ID: 2c3762db65bbffbc47aa982c740804c090a5e44b1bff058c59a5dc5e49fafb03
                                                                                  • Instruction ID: 02582652cf6ab047703313141991ca66c22d54f906eb069ee90fc7dba8f17d52
                                                                                  • Opcode Fuzzy Hash: 2c3762db65bbffbc47aa982c740804c090a5e44b1bff058c59a5dc5e49fafb03
                                                                                  • Instruction Fuzzy Hash: D2019AB1904649EFE710DF48DC05B9AFBE8FB05720F10466AE924977C0D7F56914CB90
                                                                                  APIs
                                                                                    • Part of subcall function 005F6215: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,00000000,00000000,80004005,5D2E80A5,?), ref: 005F6275
                                                                                  • RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateExceptionHeapRaise
                                                                                  • String ID:
                                                                                  • API String ID: 3789339297-0
                                                                                  • Opcode ID: a609b7556558e88741c259beaf0dc22627d9ead2d905180c514c0ecc64ea61df
                                                                                  • Instruction ID: be97b97e88671d7f4b72336fb9ad3888c8161e84198281d16d19bfed0b9c6786
                                                                                  • Opcode Fuzzy Hash: a609b7556558e88741c259beaf0dc22627d9ead2d905180c514c0ecc64ea61df
                                                                                  • Instruction Fuzzy Hash: 6BF0E275648608FFCB059F04DC06F6ABBA9FB04B00F008A69B915D36A0E736A8148B54
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000000,?,00000004,?,006097C5,?,00000000,?,005FFA29,?,00000004,00000000,00000000,?,?,00604979), ref: 00606E75
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 64fedc312764697a9e484b48bf767b63daebf4a8de3a2d64ea97cbdd4c456c8e
                                                                                  • Instruction ID: 3676abb7e8c47cdb616a79d9512999408ef91e711d2c847fa4fd814572005ae7
                                                                                  • Opcode Fuzzy Hash: 64fedc312764697a9e484b48bf767b63daebf4a8de3a2d64ea97cbdd4c456c8e
                                                                                  • Instruction Fuzzy Hash: FBF0E5369C97226EEB252675CC01BDB368A9F417A1F110220BC09D22E0DF51CC2281F4
                                                                                  APIs
                                                                                  • VirtualProtect.KERNELBASE(00657000,00000080,00000002,?), ref: 00607636
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 544645111-0
                                                                                  • Opcode ID: 83da01e83b0e7e247ff5a3892df9f48146b2e02743260bb1c9e934d022514fb6
                                                                                  • Instruction ID: adbf8348b540b1672f193e1003db42b557c99d09b2273621e2fd52e9675377e0
                                                                                  • Opcode Fuzzy Hash: 83da01e83b0e7e247ff5a3892df9f48146b2e02743260bb1c9e934d022514fb6
                                                                                  • Instruction Fuzzy Hash: 58C08C71348308B7E7204B929C0BF4B369EAB80FA1F558110FA01E60C0E9A0EE084220
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 878a4a9c63e34a196fb3a7e2ec4964d7d822ca4c0a3aabbaf5bfc5571dd7564e
                                                                                  • Instruction ID: 31a0c91adb9591261f3dbad571f1f2d41dca301fb254af956ac47da2bb64b68d
                                                                                  • Opcode Fuzzy Hash: 878a4a9c63e34a196fb3a7e2ec4964d7d822ca4c0a3aabbaf5bfc5571dd7564e
                                                                                  • Instruction Fuzzy Hash: C0B01281299406FC36485258EE0AC760D4ED4D0F21732841AFE00C20C1D5844C08513D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: c0ff2a74b92141cea2b37866d628678b88559c91d23fda7407f4bcedc696b2af
                                                                                  • Instruction ID: 54b3bf8fcfbea1620cea5cb4d149091ae5951d0f71de86221d1905142633dbe7
                                                                                  • Opcode Fuzzy Hash: c0ff2a74b92141cea2b37866d628678b88559c91d23fda7407f4bcedc696b2af
                                                                                  • Instruction Fuzzy Hash: 27B01285299506FC37485248EE0AC760D4ED4D0F11732451AFA00C20C1D4844C4C513D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: e63ac920e4e1f13c542bdeb18a2e37a64c31ca044ee80f107eb4b769c0595821
                                                                                  • Instruction ID: 6ca939a876dc274835456e43057589965e697c336b04a609466c0f2c6d66a3ac
                                                                                  • Opcode Fuzzy Hash: e63ac920e4e1f13c542bdeb18a2e37a64c31ca044ee80f107eb4b769c0595821
                                                                                  • Instruction Fuzzy Hash: DBB01291299406FC36485348EF0AC760D8ED4D0F11B32851AFB00C20C1D4844C09513D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 99c73028bfc00464ba6b7691b67258ef2c6b82cd4cf961b5f9e554564e8bc82d
                                                                                  • Instruction ID: 28cda6722f4cc05d206261c006d52c4bd1d0c126a2dff5b9d56ccfb1c9467d8e
                                                                                  • Opcode Fuzzy Hash: 99c73028bfc00464ba6b7691b67258ef2c6b82cd4cf961b5f9e554564e8bc82d
                                                                                  • Instruction Fuzzy Hash: 61B012813AB406FC3A085248EE0AD77090EE4D0F12732441AFA01C20C1D4844C08513D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: f1ca120f90d97f0acc43b7d75d1203aafffac1eb92c4e19af8c9d1fc12153359
                                                                                  • Instruction ID: b645f72656722b0125fbba284599300fa69d4652a9a7cceb09561d4a6f022dfc
                                                                                  • Opcode Fuzzy Hash: f1ca120f90d97f0acc43b7d75d1203aafffac1eb92c4e19af8c9d1fc12153359
                                                                                  • Instruction Fuzzy Hash: C1B01281299406FC36585348EF0AD76090ED0D0F15732851AFB00C20C1D4944C09613D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: e62906d08ff13060c655640a86f54db78647f0320a07e49a2a59b999acc1515d
                                                                                  • Instruction ID: c38d73736f98cc952bae6c816579ad9a5fb7d855a38fa8b351fd82e526e9d56c
                                                                                  • Opcode Fuzzy Hash: e62906d08ff13060c655640a86f54db78647f0320a07e49a2a59b999acc1515d
                                                                                  • Instruction Fuzzy Hash: 64B01281299406FC36185248EE0AE77090EE0D0F15732481AFA01C20C1D8944C08613D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 5d9eeacd59291ab568a08eb6460fd4db69853dc966e7bc4752462beadb4cfe70
                                                                                  • Instruction ID: b189be221aa2aa8e60a92eb64d7b4fbd7aea7701b4e2d5e2c874bbe10001fe1b
                                                                                  • Opcode Fuzzy Hash: 5d9eeacd59291ab568a08eb6460fd4db69853dc966e7bc4752462beadb4cfe70
                                                                                  • Instruction Fuzzy Hash: 54B01281299406FC36085648EE0AC760A5ED0D0F31772841AFE00C20C1D4944C48513D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 772e8a4a5672842d9350bd311ab811b51c88eddac216ef82c02f2fc8a3dbdab3
                                                                                  • Instruction ID: 182731edb80b3135eec220891ac90710d95f837f04bcec84d6d5e7b2c5aa7454
                                                                                  • Opcode Fuzzy Hash: 772e8a4a5672842d9350bd311ab811b51c88eddac216ef82c02f2fc8a3dbdab3
                                                                                  • Instruction Fuzzy Hash: F9B01281299506FC3B485648EE0AC76090EE0D0F21772451AFA00C20C1D4844C8C513D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: dead88b7435d61b9ffd729e26cde7daf87bfe72c9c2150aabb3c5f3523a26637
                                                                                  • Instruction ID: 9552545427c02337d00c165be81e88b2f04b9b0e524cb012378315b7f6125d77
                                                                                  • Opcode Fuzzy Hash: dead88b7435d61b9ffd729e26cde7daf87bfe72c9c2150aabb3c5f3523a26637
                                                                                  • Instruction Fuzzy Hash: 9FB01281299406FC36185248EE0AD76090ED0D0F25732841AFE00C20C1D4988C08613D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 7382614dcd5a85811c7912bb8f602667428dadabb68da7f4932ddf9590000f0b
                                                                                  • Instruction ID: e1149b98135f79b956e039c5af8fc98732c052a2effce70ab21ac058c8b985dd
                                                                                  • Opcode Fuzzy Hash: 7382614dcd5a85811c7912bb8f602667428dadabb68da7f4932ddf9590000f0b
                                                                                  • Instruction Fuzzy Hash: EEB01281299506FC37585248EE0AD76090ED0D0F15732451AFA00C20C1D4944C4C617D
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: bfc7edbdc0f3263ad16635e693ea16d32d4580e2433a76327c2066692967d209
                                                                                  • Instruction ID: 988db5395f566a70bee49ed5b88222ab3e1fc15913c07ea810c6bca1ad25afa9
                                                                                  • Opcode Fuzzy Hash: bfc7edbdc0f3263ad16635e693ea16d32d4580e2433a76327c2066692967d209
                                                                                  • Instruction Fuzzy Hash: 70A01281199407FC35081240ED0AC76050DD0D0F103324809F601C008154840804103C
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 44947a2df7b29b4dbe10766d4495ec4fda788d829fd60a27433abb45989829ff
                                                                                  • Instruction ID: 988db5395f566a70bee49ed5b88222ab3e1fc15913c07ea810c6bca1ad25afa9
                                                                                  • Opcode Fuzzy Hash: 44947a2df7b29b4dbe10766d4495ec4fda788d829fd60a27433abb45989829ff
                                                                                  • Instruction Fuzzy Hash: 70A01281199407FC35081240ED0AC76050DD0D0F103324809F601C008154840804103C
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 0c4044ebbefca616fc3dde40c421a2dd2d9c82ae08610a4dd46de4fcd0da420c
                                                                                  • Instruction ID: 988db5395f566a70bee49ed5b88222ab3e1fc15913c07ea810c6bca1ad25afa9
                                                                                  • Opcode Fuzzy Hash: 0c4044ebbefca616fc3dde40c421a2dd2d9c82ae08610a4dd46de4fcd0da420c
                                                                                  • Instruction Fuzzy Hash: 70A01281199407FC35081240ED0AC76050DD0D0F103324809F601C008154840804103C
                                                                                  APIs
                                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 005F14F7
                                                                                    • Part of subcall function 005F1934: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 005F19B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionHelper2@8LoadRaise___delay
                                                                                  • String ID:
                                                                                  • API String ID: 123106877-0
                                                                                  • Opcode ID: 335289d856d8e52fd6ce3e6761d92667cfe144a266a6db6616cf03ffe28812f0
                                                                                  • Instruction ID: 988db5395f566a70bee49ed5b88222ab3e1fc15913c07ea810c6bca1ad25afa9
                                                                                  • Opcode Fuzzy Hash: 335289d856d8e52fd6ce3e6761d92667cfe144a266a6db6616cf03ffe28812f0
                                                                                  • Instruction Fuzzy Hash: 70A01281199407FC35081240ED0AC76050DD0D0F103324809F601C008154840804103C
                                                                                  APIs
                                                                                  • SHGetFolderPathW.SHELL32(?,?,?,?,FF005A02,SystemFolder,0000000C), ref: 005B2756
                                                                                  • GetSystemDirectoryW.KERNEL32(FF005A02,00000104), ref: 005B285F
                                                                                  • GetWindowsDirectoryW.KERNEL32(FF005A02,00000104,WindowsFolder,0000000D), ref: 005B298C
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • GetWindowsDirectoryW.KERNEL32(FF005A02,00000104,WindowsVolume,0000000D), ref: 005B2ABC
                                                                                    • Part of subcall function 00585350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0059E648,-00000010), ref: 00585373
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,FF005A02,00000104,WindowsVolume,0000000D), ref: 005B2C2C
                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,FF0055AA,WindowsVolume,0000000D), ref: 005B2D12
                                                                                  • LoadLibraryW.KERNEL32(shfolder.dll), ref: 005B2DA0
                                                                                  • GetProcAddress.KERNEL32(?,SHGetFolderPathW), ref: 005B2DDC
                                                                                  • GetEnvironmentVariableW.KERNEL32(APPDATA,FF0057FA,00000104), ref: 005B2FD0
                                                                                  • SHGetPathFromIDListW.SHELL32(?,FF005A02), ref: 005B3059
                                                                                  • SHGetMalloc.SHELL32(FF0055AE), ref: 005B3072
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Directory$FolderPathWindows$AddressEnvironmentFileFindFromHeapLibraryListLoadLocationMallocModuleNameProcProcessResourceSpecialSystemVariable
                                                                                  • String ID: 00e$APPDATA$AppDataFolder$PROGRAMFILES$ProgramFiles$ProgramFiles64Folder$ProgramFilesFolder$ProgramW6432$SETUPEXEDIR$SHGetFolderPathW$Shell32.dll$Shlwapi.dll$System32Folder$SystemFolder$TempFolder$WindowsFolder$WindowsVolume$shfolder.dll
                                                                                  • API String ID: 700146523-2154485442
                                                                                  • Opcode ID: 6e881cff6a21f6927abf67edf6f59469c52e468cee565d16302d88c5ba6997cf
                                                                                  • Instruction ID: 553b1903a3b3e31b4f4f51fe329a983579c37410195220c789cd6702bfa952f5
                                                                                  • Opcode Fuzzy Hash: 6e881cff6a21f6927abf67edf6f59469c52e468cee565d16302d88c5ba6997cf
                                                                                  • Instruction Fuzzy Hash: 6B6225316006059BDB24EF24CC59BFA7BB2FF64714F5445A8D806A7390EB32EE45CBA0
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00650A8C,C0000000,00000003,00000000,00000004,00000080,00000000,5D2E80A5,00000000,00650A80,00650A68), ref: 005AAB18
                                                                                  • GetLastError.KERNEL32 ref: 005AAB40
                                                                                  • OutputDebugStringW.KERNEL32(00000000,00000020), ref: 005AABC5
                                                                                  • OutputDebugStringW.KERNEL32(00000000,?,0000001C), ref: 005AACF2
                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0000001C), ref: 005AAD8E
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • OutputDebugStringW.KERNEL32(00000000,?,0000001D), ref: 005AAE31
                                                                                  • WriteFile.KERNEL32(00000000,0061C02D,00000002,00000002,00000000,?,0000001D), ref: 005AAEDA
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 005AAEE3
                                                                                  • WriteFile.KERNEL32(00000000,00650864,00000000,00000002,00000000,?,0000001D), ref: 005AAF05
                                                                                  • WriteFile.KERNEL32(00000000,000000FF,?,00000002,00000000,006337E8,00000002), ref: 005AAFC4
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001D), ref: 005AAFCD
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 005AAF0E
                                                                                    • Part of subcall function 00585350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0059E648,-00000010), ref: 00585373
                                                                                  • WriteFile.KERNEL32(00000000,000000FF,?,00000002,00000000,006337E8,00000002), ref: 005AB079
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001D), ref: 005AB082
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFlushWrite$DebugOutputString$CreateErrorFindHeapLastPointerProcessResource
                                                                                  • String ID: LOGGER->Creating LOG file at:$LOGGER->Reusing LOG file at:$LOGGER->failed to create LOG at:$OS Version: %u.%u.%u SP%u (%s) [%s]$server$workstation$x64$x86$7c
                                                                                  • API String ID: 611875259-3656310774
                                                                                  • Opcode ID: 40f8ae4c25f53667a7dc94889ca3152e3b483af7e52754e08f54c122d4b60e50
                                                                                  • Instruction ID: 390e8456ec1f6cc04b2b5e559c43848c00ba6f70dda362498a1a606ae42b5c69
                                                                                  • Opcode Fuzzy Hash: 40f8ae4c25f53667a7dc94889ca3152e3b483af7e52754e08f54c122d4b60e50
                                                                                  • Instruction Fuzzy Hash: 0212AD71A006059FDB10DF68CC59B6EBBB6FF44320F144258E825AB3D2DB75AE02DB91
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 005EF45E
                                                                                  • GetLastError.KERNEL32 ref: 005EF469
                                                                                  • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005EF953
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005EF997
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 005EFAFE
                                                                                  • SetEvent.KERNEL32(?), ref: 005EFE21
                                                                                  • GetLastError.KERNEL32 ref: 005EFE2F
                                                                                  • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005F01B9
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005F020F
                                                                                  • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 005F0250
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005F025B
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 005F0381
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 005F0418
                                                                                  • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005F04BF
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005F050F
                                                                                  • SetEvent.KERNEL32(?), ref: 005F05AB
                                                                                  • GetLastError.KERNEL32 ref: 005F05B9
                                                                                  • SetEvent.KERNEL32(?), ref: 005F05CE
                                                                                  • GetLastError.KERNEL32 ref: 005F05D8
                                                                                  • SetEvent.KERNEL32(?), ref: 005F0608
                                                                                  • GetLastError.KERNEL32 ref: 005F0616
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$ErrorLast$EnterEventLeave$ObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3699643388-0
                                                                                  • Opcode ID: 623ba3d51da581205afe273cca82d5b429a289b843e96532695120f77ef1ab7c
                                                                                  • Instruction ID: fbae2bb649ce0b3484a80742197a2f2bee1d342af7a7b7c9c4c89520ab0dcd7b
                                                                                  • Opcode Fuzzy Hash: 623ba3d51da581205afe273cca82d5b429a289b843e96532695120f77ef1ab7c
                                                                                  • Instruction Fuzzy Hash: AAC2CE74A087858FD764CF29C484B6AFBE1BF88304F14992EE9D993351DB74A844CF52
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000,00000000,?), ref: 005D949D
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005D94AF
                                                                                  • GetLastError.KERNEL32 ref: 005D94B9
                                                                                  • CloseHandle.KERNEL32(FFFFFFFF), ref: 005D94F9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CreateErrorFileLast
                                                                                  • String ID: $$NUMBER_OF_PROCESSORS$\
                                                                                  • API String ID: 3884794734-458196154
                                                                                  • Opcode ID: 2e15953f87df7aaa828fdf67544378e522cdd179ab7f91fc26e9078cc72785ad
                                                                                  • Instruction ID: 68310f68c9395284bcec2b1538aac4ddf4a4a1ba8429300f53eba9de6ee4994b
                                                                                  • Opcode Fuzzy Hash: 2e15953f87df7aaa828fdf67544378e522cdd179ab7f91fc26e9078cc72785ad
                                                                                  • Instruction Fuzzy Hash: A2724870900669DBDB24DF28CD48BADBBF4BF44304F1481DAE489A7291DB75AE85CF90
                                                                                  APIs
                                                                                  • FindClose.KERNEL32(00000000,00000000), ref: 005A3BC5
                                                                                  • PathIsUNCW.SHLWAPI(5D2E80A5,*.*,00000000), ref: 005A3C8B
                                                                                  • FindFirstFileW.KERNEL32(5D2E80A5,?,*.*,00000000), ref: 005A3E1B
                                                                                  • GetFullPathNameW.KERNEL32(5D2E80A5,00000000,00000000,00000000), ref: 005A3E35
                                                                                  • GetFullPathNameW.KERNEL32(5D2E80A5,00000000,?,00000000), ref: 005A3E68
                                                                                  • FindClose.KERNEL32(00000000,?,00000000), ref: 005A3ED0
                                                                                  • SetLastError.KERNEL32(0000007B,?,00000000), ref: 005A3EDA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindPath$CloseFullName$ErrorFileFirstLast
                                                                                  • String ID: 2#vp1#v$*.*$\\?\$\\?\UNC\
                                                                                  • API String ID: 539638818-402361260
                                                                                  • Opcode ID: 8d1fd6a771963c962c9e038168d674a83fbdd3586df79fbc1ba45d00fb16076f
                                                                                  • Instruction ID: 00b34f1dc04710dc8ba516db2c7373cc805142eaa0670205f7604c87e24ddd57
                                                                                  • Opcode Fuzzy Hash: 8d1fd6a771963c962c9e038168d674a83fbdd3586df79fbc1ba45d00fb16076f
                                                                                  • Instruction Fuzzy Hash: E0E1CF70A006029FCB14DF68C859B6EBBB2FF85318F14416CE912AB391EB75AE45CB50
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,00000000,-00000010,?,5D2E80A5,?,?,00000000), ref: 005CAD09
                                                                                  • FindNextFileW.KERNEL32(?,00000000,?,00000000), ref: 005CAD24
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$FirstNext
                                                                                  • String ID: 2#vp1#v$0!X$@9c$p2#v3#v
                                                                                  • API String ID: 1690352074-578336468
                                                                                  • Opcode ID: 9f3c6ad43327c1b6c6227c218bc088f62dbeb51511502ebce501d061efe6ac90
                                                                                  • Instruction ID: 29a827619afd2551da32ed2b980d8fcfdcc9c660e956722e402e037be3fee1fd
                                                                                  • Opcode Fuzzy Hash: 9f3c6ad43327c1b6c6227c218bc088f62dbeb51511502ebce501d061efe6ac90
                                                                                  • Instruction Fuzzy Hash: AE817971D00689DFEB10DFA8C899BEDBBB5FF48324F148159E815A7291EB349A09CB50
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(?,?,?,?,00000000), ref: 005D7CCD
                                                                                  • GetProcessAffinityMask.KERNEL32(00000000), ref: 005D7CD4
                                                                                  • GetSystemInfo.KERNEL32(?), ref: 005D7D55
                                                                                  • GetModuleHandleA.KERNEL32 ref: 005D7DA4
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 005D7DAB
                                                                                  • GlobalMemoryStatus.KERNEL32(?), ref: 005D7E05
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$AddressAffinityCurrentGlobalHandleInfoMaskMemoryModuleProcStatusSystem
                                                                                  • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
                                                                                  • API String ID: 3120231856-802862622
                                                                                  • Opcode ID: 80ad9b7ecbc8d428d6c87d0b7426ad0363a2ffa06c7804043a74ef8a3be9e49e
                                                                                  • Instruction ID: 632c71d040afc0774b9f2c9421e3f20e0fe9389ae37ef93fd1e3532c08bcd238
                                                                                  • Opcode Fuzzy Hash: 80ad9b7ecbc8d428d6c87d0b7426ad0363a2ffa06c7804043a74ef8a3be9e49e
                                                                                  • Instruction Fuzzy Hash: EC718CB1A083118FD718CF29D88475ABBE6BF88714F05892EE859CB351E774D904CB86
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000060,5D2E80A5,8007000E,00000000,?,?,?,?,?,?,?,?,0061A915,000000FF), ref: 005A2799
                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,?,?,?,?,?,?,?,?,0061A915,000000FF), ref: 005A27AC
                                                                                  • FindResourceW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0061A915,000000FF), ref: 005A27CC
                                                                                  • LoadResource.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,0061A915,000000FF), ref: 005A27E4
                                                                                    • Part of subcall function 005A0A20: GetLastError.KERNEL32(5D2E80A5,00000000,00615110,000000FF,?,8007000E), ref: 005A0A42
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0061A915,000000FF), ref: 005A28C5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$Resource$ErrorFindFreeLast
                                                                                  • String ID: Module$Module_Raw$REGISTRY
                                                                                  • API String ID: 328770362-549000027
                                                                                  • Opcode ID: 969045c40ffe68096d079ad57aa5bf176911331a978eafb9b97c6f6d5804f87c
                                                                                  • Instruction ID: 0f4574e0a207d06127367c7ee40fe1489a938443e1fccee723fed4ec2c637eb5
                                                                                  • Opcode Fuzzy Hash: 969045c40ffe68096d079ad57aa5bf176911331a978eafb9b97c6f6d5804f87c
                                                                                  • Instruction Fuzzy Hash: F651D2B190464AEFDB20DF68CC46BEE7FB9FF85710F104129F905A7280DB389A458B65
                                                                                  APIs
                                                                                  • ResetEvent.KERNEL32(?), ref: 005EDA77
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 005EDA87
                                                                                  • GetLastError.KERNEL32 ref: 005EDA98
                                                                                  • ResetEvent.KERNEL32(?), ref: 005EDAB8
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 005EDAC8
                                                                                  • GetLastError.KERNEL32 ref: 005EDAD9
                                                                                  • GetLastError.KERNEL32 ref: 005EDB1A
                                                                                  • SetEvent.KERNEL32(?), ref: 005EDB56
                                                                                  • GetLastError.KERNEL32 ref: 005EDB60
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?), ref: 005EDBA8
                                                                                  • GetLastError.KERNEL32 ref: 005EDBB3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorEventLast$CreateReset$ObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3708806560-0
                                                                                  • Opcode ID: de64f35cd2f0a06916d320111e1bc5f69cc5c6f1438aeb7e6435eb9798b2f382
                                                                                  • Instruction ID: 1537c4017a84fe2b666085704deb35f5487ca4ef28fc38c9267c2e34ff856f68
                                                                                  • Opcode Fuzzy Hash: de64f35cd2f0a06916d320111e1bc5f69cc5c6f1438aeb7e6435eb9798b2f382
                                                                                  • Instruction Fuzzy Hash: 8291C471304A868FE72D8B2BD844B267BF6FB84351F25452DE597C72A1EB71EC41CA20
                                                                                  APIs
                                                                                    • Part of subcall function 005F46AF: AcquireSRWLockExclusive.KERNEL32(0064FFB8,?,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46BA
                                                                                    • Part of subcall function 005F46AF: ReleaseSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46F4
                                                                                  • GetStdHandle.KERNEL32(000000F5,?,?,?), ref: 005AE2EA
                                                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 005AE2F1
                                                                                  • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 005AE305
                                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 005AE30C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleExclusiveHandleLock$AcquireAttributeBufferInfoReleaseScreenText
                                                                                  • String ID: Error$F^Z
                                                                                  • API String ID: 719367182-1778321922
                                                                                  • Opcode ID: 151cf5bd927334b4ae685440a63f8a180bec62f2cb0f931a5df82e656ad92d9c
                                                                                  • Instruction ID: 7d3a628b3a649dfac27142e2a19560cbd5674ba81fd53b9e42f139d72152787f
                                                                                  • Opcode Fuzzy Hash: 151cf5bd927334b4ae685440a63f8a180bec62f2cb0f931a5df82e656ad92d9c
                                                                                  • Instruction Fuzzy Hash: 32428E70D0021ADFDB24DF64CC59BAEBBB5BF49314F104299E419A7291EB74AA84CF90
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(5D2E80A5,?,?), ref: 0058C402
                                                                                  • MessageBoxW.USER32(00000000,?,?,00000044), ref: 0058C40D
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0058C4FB
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028,00000000), ref: 0058C508
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0058C528
                                                                                  • GetLastError.KERNEL32 ref: 0058C56D
                                                                                  • ExitWindowsEx.USER32(00000006,80040002), ref: 0058C57E
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0058C59E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleProcess$CurrentErrorExitForegroundLastMessageOpenTokenWindowWindows
                                                                                  • String ID: SeShutdownPrivilege
                                                                                  • API String ID: 1440564136-3733053543
                                                                                  • Opcode ID: 2940c606c85f3a9222623e267b41ea137a05826ce789826128fe257125d17a02
                                                                                  • Instruction ID: c320b144a118c907d9a15c57f0406eea0478c644e387c6dab1305f6168bc5fe9
                                                                                  • Opcode Fuzzy Hash: 2940c606c85f3a9222623e267b41ea137a05826ce789826128fe257125d17a02
                                                                                  • Instruction Fuzzy Hash: 96617D70A006099BDB10EFA8DC59BADBFB5FB08324F145259E811B72D0DB74AD46DBA0
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(000000F5,?,?,?), ref: 005AE2EA
                                                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 005AE2F1
                                                                                  • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 005AE305
                                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 005AE30C
                                                                                  • GetStdHandle.KERNEL32(000000F5,?,?,00000000,?,00000000,006337E8,00000002,?,?), ref: 005AE3CA
                                                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 005AE3D1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleHandle$AttributeText$BufferInfoScreen
                                                                                  • String ID: *** Stack Trace (x86) ***$F^Z
                                                                                  • API String ID: 575076100-3150557717
                                                                                  • Opcode ID: d47dcac1d6f47d11ded3ce3d17ffc743c3233202690c28a6dda1815b1446a647
                                                                                  • Instruction ID: 5a977f784f1b11ee2c00fef4655a80f329ba7d85d4602dd0cbb1cd33796012ba
                                                                                  • Opcode Fuzzy Hash: d47dcac1d6f47d11ded3ce3d17ffc743c3233202690c28a6dda1815b1446a647
                                                                                  • Instruction Fuzzy Hash: 2022AD7090021ADFDB24DF68CC59BEEBBB5FF49314F104299E415A7291EB74AA84CF90
                                                                                  APIs
                                                                                  • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,FF005A36,5D2E80A5,00000000,00000000,00000000), ref: 005AF2CB
                                                                                  • GetTempFileNameW.KERNEL32(?,shim_clone,00000000,FF005C3E), ref: 005AF444
                                                                                  • Wow64DisableWow64FsRedirection.KERNEL32(FF0059FA), ref: 005AF4F1
                                                                                  • CopyFileW.KERNEL32(?,?,00000000), ref: 005AF513
                                                                                  • Wow64RevertWow64FsRedirection.KERNEL32(?), ref: 005AF59E
                                                                                  • DeleteFileW.KERNEL32(?,5D2E80A5,?,00000000,00614F60,000000FF,FF005E5A,80004005,FF005A1E), ref: 005AF6AD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Wow64$File$Redirection$CopyDeleteDisableFolderNamePathRevertTemp
                                                                                  • String ID: shim_clone
                                                                                  • API String ID: 3507832535-3944563459
                                                                                  • Opcode ID: c41528cd8d94d1e51ca4062eb3d38bffb6c9e7c5afcbaede4b606c5bf25508de
                                                                                  • Instruction ID: d7c1d48626397866248ffbc8c0b2081e08aeeb6fe4f7315e0eb0924878f26121
                                                                                  • Opcode Fuzzy Hash: c41528cd8d94d1e51ca4062eb3d38bffb6c9e7c5afcbaede4b606c5bf25508de
                                                                                  • Instruction Fuzzy Hash: C3C1D070A006598FCF24DF68CC45BAE7BB4FF4A300F1440A9E90697292EB349E45CB55
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFindFirstHeapProcess
                                                                                  • String ID: 2#vp1#v$0!X$p2#v3#v
                                                                                  • API String ID: 284326027-3019436278
                                                                                  • Opcode ID: 0b7bcceec35a4ba6c70894c435978b4a4c9925fbf3f63e6e97590f52f18edf98
                                                                                  • Instruction ID: 2c113e9dbbbc4e5d2184b58634e70305d24a681cf6637f972e6ea5f91c6d9eba
                                                                                  • Opcode Fuzzy Hash: 0b7bcceec35a4ba6c70894c435978b4a4c9925fbf3f63e6e97590f52f18edf98
                                                                                  • Instruction Fuzzy Hash: B0918A71901619DFDB20DF68CC4DBA9BBB5FF49320F248299E818A7291DB309E45CF91
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • GetLogicalDriveStringsW.KERNEL32(00000064), ref: 005C8320
                                                                                  • GetDriveTypeW.KERNEL32(FF005B92), ref: 005C833A
                                                                                  • Wow64DisableWow64FsRedirection.KERNEL32(FF005B6E,FF005B46), ref: 005C83E3
                                                                                  • Wow64RevertWow64FsRedirection.KERNEL32(?,FF005B46), ref: 005C8686
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Wow64$DriveRedirection$DisableHeapLogicalProcessRevertStringsType
                                                                                  • String ID: ]%!$\c
                                                                                  • API String ID: 4157823300-3251890830
                                                                                  • Opcode ID: 125a6ef797545bf28a145d07862b7140c5abdd2b50e6f92adac12947d7a63860
                                                                                  • Instruction ID: 95d86b65dd0c613bc1eceb7febbd8d4cf6d924405e86a25cce20dab015db34bf
                                                                                  • Opcode Fuzzy Hash: 125a6ef797545bf28a145d07862b7140c5abdd2b50e6f92adac12947d7a63860
                                                                                  • Instruction Fuzzy Hash: E402AF3190065A8FDB24DF68CC98BADBBB5BF44310F1485EDD91AA7281DB709E85CF90
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,FF00598A), ref: 00581A49
                                                                                  • FindClose.KERNEL32(?,?), ref: 00581C12
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileFirst
                                                                                  • String ID: 2#vp1#v$0!X$p2#v3#v
                                                                                  • API String ID: 2295610775-3019436278
                                                                                  • Opcode ID: 95f5f6635cded6da87cc6267427f0e8ba0072304da75dce4e16d2e1c446b5544
                                                                                  • Instruction ID: e06afe834ccb53b02f8a7a49dd47cec524a5556daa0fa1e9099f9c561c012edb
                                                                                  • Opcode Fuzzy Hash: 95f5f6635cded6da87cc6267427f0e8ba0072304da75dce4e16d2e1c446b5544
                                                                                  • Instruction Fuzzy Hash: 19918D70D01609DBDB24EF64C999BEEBBB9FF44300F108299D815B7291EB706E85CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6fc5b24ee5b51c8dcf27c66190c15f5a076e4cf2f34421ad3f97f2208b9a8dcd
                                                                                  • Instruction ID: 73c926c1b32e8228a83aad038561a3f1b55a6d58eea23feb2d7cd996bc0b8cb1
                                                                                  • Opcode Fuzzy Hash: 6fc5b24ee5b51c8dcf27c66190c15f5a076e4cf2f34421ad3f97f2208b9a8dcd
                                                                                  • Instruction Fuzzy Hash: B6E27870A00299DFDB14DF69C898BAEBFB5BF48304F148199E845AB391C774AE41CF90
                                                                                  APIs
                                                                                  • __libm_sse2_log10_precise.LIBCMT ref: 00610F99
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: __libm_sse2_log10_precise
                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                  • API String ID: 3323863637-2761157908
                                                                                  • Opcode ID: 501df92cee56bed49c1013727d10da11590c3ea8e30e015a0010e847bd85b183
                                                                                  • Instruction ID: c10144150c9e325fbed53a0bbe8311d42bdf0923fbfaad12fe05cd2670f4e95d
                                                                                  • Opcode Fuzzy Hash: 501df92cee56bed49c1013727d10da11590c3ea8e30e015a0010e847bd85b183
                                                                                  • Instruction Fuzzy Hash: 7CC24E72E042298FDB65CE28DD447EAB7B6EB49304F1841EAD94DE7240E774AEC18F41
                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000C,005F1DDA,00000000,?,005F1F72,00000000), ref: 005F1EC0
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,?,005F1F72,00000000), ref: 005F1EE7
                                                                                  • HeapAlloc.KERNEL32(00000000,?,005F1F72,00000000), ref: 005F1EEE
                                                                                  • InitializeSListHead.KERNEL32(00000000,?,005F1F72,00000000), ref: 005F1EFB
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,005F1F72,00000000), ref: 005F1F10
                                                                                  • HeapFree.KERNEL32(00000000,?,005F1F72,00000000), ref: 005F1F17
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 1475849761-0
                                                                                  • Opcode ID: caeb1474f9fb188d4bc2fe37f2458fbd81ae3f8dc4ee619e1d07ca68af01fa76
                                                                                  • Instruction ID: 477bf234c09d4b26763a494f711f6735b272acd36d74492ff791a515976ef96f
                                                                                  • Opcode Fuzzy Hash: caeb1474f9fb188d4bc2fe37f2458fbd81ae3f8dc4ee619e1d07ca68af01fa76
                                                                                  • Instruction Fuzzy Hash: 2EF04F75205A01DFD7209F79AC08F267ABABB95B52F049429FA45D7250EB3488068B61
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,FF0059C6), ref: 005C9916
                                                                                  • FindClose.KERNEL32(00000000), ref: 005C9A99
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$AllocateCloseFileFirstHeap
                                                                                  • String ID: 2#vp1#v$%d.%d.%d.%d$0!X
                                                                                  • API String ID: 1673784098-3398128289
                                                                                  • Opcode ID: 38646bd6c2bbf40dec1e39864d3ae85f0375a17dd994cf6ed2b67eaa7667dc19
                                                                                  • Instruction ID: 23c344819bca52c1a8b08cdddd14b26cc2e45d4bd9b2343b31865f42f6b544b6
                                                                                  • Opcode Fuzzy Hash: 38646bd6c2bbf40dec1e39864d3ae85f0375a17dd994cf6ed2b67eaa7667dc19
                                                                                  • Instruction Fuzzy Hash: BD7196709052199FCF20EF68CC4DBADBBB5BF44314F1082D9E819AB291DB359A84CF80
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,0060FD5D,00000002,00000000,?,?,?,0060FD5D,?,00000000), ref: 0060FADE
                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,0060FD5D,00000002,00000000,?,?,?,0060FD5D,?,00000000), ref: 0060FB07
                                                                                  • GetACP.KERNEL32(?,?,0060FD5D,?,00000000), ref: 0060FB1C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: ACP$OCP
                                                                                  • API String ID: 2299586839-711371036
                                                                                  • Opcode ID: e093014d9e1f8819db9dae96ca81d086c5f180eb76419a9ee313f8be84e3dc82
                                                                                  • Instruction ID: 464ac2a28963d4c4874af2e7943416fb327f78669c82ba6b3bae7a0e6a180abe
                                                                                  • Opcode Fuzzy Hash: e093014d9e1f8819db9dae96ca81d086c5f180eb76419a9ee313f8be84e3dc82
                                                                                  • Instruction Fuzzy Hash: F321A132784101EAE7388F64D901AD777ABEF54B50B5A8434E90EDBB90E732DE41C790
                                                                                  APIs
                                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0060FD2F
                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 0060FD6D
                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0060FD80
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0060FDC8
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0060FDE3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Locale$InfoValid$CodeDefaultPageUser
                                                                                  • String ID:
                                                                                  • API String ID: 3475089800-0
                                                                                  • Opcode ID: f8e62382cb5f4c6696f99004ceb10406ce3ac6c81ef0b3fd6a517a2dbe7bf193
                                                                                  • Instruction ID: f56db0ed800692b0d523ca03d061c83839878cdde55d12fcd829a6ab3f7105c4
                                                                                  • Opcode Fuzzy Hash: f8e62382cb5f4c6696f99004ceb10406ce3ac6c81ef0b3fd6a517a2dbe7bf193
                                                                                  • Instruction Fuzzy Hash: CA516171A40609ABEB74DFA4CC45AFF77BABF44700F140479E901E76D1EBB09A418BA1
                                                                                  APIs
                                                                                  • GetACP.KERNEL32(?,?,?,?,?,?,00605626,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0060F34D
                                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00605626,?,?,?,00000055,?,-00000050,?,?), ref: 0060F384
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078,-00000050,00000000,000000D0), ref: 0060F4F0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CodeInfoLocalePageValid
                                                                                  • String ID: utf8
                                                                                  • API String ID: 790303815-905460609
                                                                                  • Opcode ID: b511438109cc96c2604eca6d3d61f7b491fb079a9a1ad6bbe7f0bc7890a6881e
                                                                                  • Instruction ID: bebdf08c69acde5e6322672b5e18d8334fe0d82513079094e686d5d6ed194c24
                                                                                  • Opcode Fuzzy Hash: b511438109cc96c2604eca6d3d61f7b491fb079a9a1ad6bbe7f0bc7890a6881e
                                                                                  • Instruction Fuzzy Hash: 5A71E871A80206AAEB3CAB348C46BBB73AAEF54710F140439F905DB6C2E675ED418691
                                                                                  APIs
                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 005CA97A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: DiskFreeSpace
                                                                                  • String ID: \$\$\
                                                                                  • API String ID: 1705453755-3791832595
                                                                                  • Opcode ID: 79d0b7e15ec382b11bee3d40ad8f61dfca9e4f414162bd4784efe6467acae54e
                                                                                  • Instruction ID: 63ee9965aecd23736aa2f563e875b1b903816be2468bc38c6e1991f5001a79b9
                                                                                  • Opcode Fuzzy Hash: 79d0b7e15ec382b11bee3d40ad8f61dfca9e4f414162bd4784efe6467acae54e
                                                                                  • Instruction Fuzzy Hash: D641D322D042598ECB309FA48442FABBFF4FF95358F168A1EE8D893041E3708D848387
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,?), ref: 005C0E9F
                                                                                  • FindClose.KERNEL32(00000000), ref: 005C0EEC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileFirst
                                                                                  • String ID: 2#vp1#v$0!X
                                                                                  • API String ID: 2295610775-2211160475
                                                                                  • Opcode ID: 4d583b0790c1435ece5a9d36f456e0d181fe1dcd317cce59a22b1db47548beb3
                                                                                  • Instruction ID: 71fbc9c00bce6f9b8818805eee3a005a0f6058c7a56265204323803b1f84247c
                                                                                  • Opcode Fuzzy Hash: 4d583b0790c1435ece5a9d36f456e0d181fe1dcd317cce59a22b1db47548beb3
                                                                                  • Instruction Fuzzy Hash: 42418C31A05219CFCB20DF68D858BA9BBB5FB45320F144299E819A73D1DB359E45CF90
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(00000000,?,5D2E80A5,?,00000000), ref: 005A7E56
                                                                                  • FindClose.KERNEL32(00000000), ref: 005A7EBE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileFirst
                                                                                  • String ID: 2#vp1#v$0!X
                                                                                  • API String ID: 2295610775-2211160475
                                                                                  • Opcode ID: 412b5f467f319505975f2a80f88fd8e13dea835d5c8d2587edd2ef6943ea7a0d
                                                                                  • Instruction ID: 13f7efe24cbee63a258dc3dc38dbc901e246d4af81a3f7140ef7166a2d917105
                                                                                  • Opcode Fuzzy Hash: 412b5f467f319505975f2a80f88fd8e13dea835d5c8d2587edd2ef6943ea7a0d
                                                                                  • Instruction Fuzzy Hash: D721F0729086189BCB20DF68CC4DBADBBB9FB49320F140399A429A32D0DB755E04CF40
                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 005F534E
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 005F541A
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005F5433
                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 005F543D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 254469556-0
                                                                                  • Opcode ID: 86eaa3a68bd6c731d97e1fff24713f62decf3d59230378fd686fb78c92655421
                                                                                  • Instruction ID: 45254e2c1a713cf5f450f37dcb667354191433abb1dd95921054d36860eef887
                                                                                  • Opcode Fuzzy Hash: 86eaa3a68bd6c731d97e1fff24713f62decf3d59230378fd686fb78c92655421
                                                                                  • Instruction Fuzzy Hash: 02311875C0561D9BDF20DF64D949BCDBBB8BF08304F1041AAE60CAB250E7749B858F45
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,006337C0,00000000), ref: 005D4E41
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,?,-00000001,00000078,-00000001), ref: 005D4E7D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$HeapProcess
                                                                                  • String ID: %d-%s
                                                                                  • API String ID: 3246605784-1781338863
                                                                                  • Opcode ID: 0f0a8315f23a45eef0d1c6408c2d771079e922448ccc63d4b31b9feac039b1f2
                                                                                  • Instruction ID: 2eb2fb5c444a05d7084b60bd1562c82df413b19e673806de506e14432a0008da
                                                                                  • Opcode Fuzzy Hash: 0f0a8315f23a45eef0d1c6408c2d771079e922448ccc63d4b31b9feac039b1f2
                                                                                  • Instruction Fuzzy Hash: 1F31BC71A00619ABDB00DF98CC4ABAEBBB9FF44724F104159E515A7391DB755A01CB90
                                                                                  APIs
                                                                                  • VirtualQuery.KERNEL32(80000000,00000000,0000001C,?,?,?,?,?,?,?,005F1642,00000000,00000000,00000004,0064F7DC,005F1944), ref: 005F170E
                                                                                  • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,005F1642,00000000,00000000,00000004,0064F7DC,005F1944), ref: 005F1729
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoQuerySystemVirtual
                                                                                  • String ID: D
                                                                                  • API String ID: 401686933-2746444292
                                                                                  • Opcode ID: 81dbce9b1ec9c8f69cb15719ede0c4d89749217ef5f6000aec1bb015c2dcb0d3
                                                                                  • Instruction ID: 15848ec858582154c281e21ef536e91d027d4e64b1f542e37527829433364593
                                                                                  • Opcode Fuzzy Hash: 81dbce9b1ec9c8f69cb15719ede0c4d89749217ef5f6000aec1bb015c2dcb0d3
                                                                                  • Instruction Fuzzy Hash: 2C01FC3260050D9BCB14EE25DC05BEE7BAAEFC4324F0CC121ED1DD7140D638D9118A80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7471089b39a0c606a1ead41c5972f56f77b679b77ddc466d9b28eb3e4bb7b9c1
                                                                                  • Instruction ID: fa19598090172c431380d20b4ac9204534788c6368baf75af385d529f28bda9f
                                                                                  • Opcode Fuzzy Hash: 7471089b39a0c606a1ead41c5972f56f77b679b77ddc466d9b28eb3e4bb7b9c1
                                                                                  • Instruction Fuzzy Hash: 88025DB1E002199FDF14CFA8D884AADFBB1FF88314F158269D919AB345D734A941CF92
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078), ref: 0060F717
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 0060F75B
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 0060F825
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: e2ee569aa68a6f1f848c5e3eeed6c034ec9b68d1e4132cdb444011b0c23b54fb
                                                                                  • Instruction ID: bd94829e0657eb8fa9dfdc2a37a07386c46258366b13090b927de6a399d2330e
                                                                                  • Opcode Fuzzy Hash: e2ee569aa68a6f1f848c5e3eeed6c034ec9b68d1e4132cdb444011b0c23b54fb
                                                                                  • Instruction Fuzzy Hash: CA615C719802169FEB7C9F24C886BBB77AAEB44300F208079E905C6A95EB74D985DB50
                                                                                  APIs
                                                                                  • GetVersionExW.KERNEL32(?), ref: 005EE3A2
                                                                                  • GetVersionExW.KERNEL32(00000114), ref: 005EE3F1
                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000011), ref: 005EE409
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version$FeaturePresentProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 1871528217-0
                                                                                  • Opcode ID: abe3fcbefd53cbe4d904426c9a7fde9e4c89b8bb29280272efa32d6d0ca57a44
                                                                                  • Instruction ID: 47e7a5129eebfb9242083f3e3329aa2136f445309c9c003d7809b6899b642118
                                                                                  • Opcode Fuzzy Hash: abe3fcbefd53cbe4d904426c9a7fde9e4c89b8bb29280272efa32d6d0ca57a44
                                                                                  • Instruction Fuzzy Hash: 82614831B103604BE74CCF2EDC856AABFD6EBC9342F044A3EE4D6C6290D678C545CAA0
                                                                                  APIs
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 005F979B
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 005F97A5
                                                                                  • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,00000000), ref: 005F97B2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                  • String ID:
                                                                                  • API String ID: 3906539128-0
                                                                                  • Opcode ID: 49304fb0fb0fa22b069b35af8098a30145103baaf5460fe334fb2b047597e458
                                                                                  • Instruction ID: b537d44b230e3a18c40b1622743b8c2d4c3aaab1db7cd9a0e5c2a1f0e9ddd05b
                                                                                  • Opcode Fuzzy Hash: 49304fb0fb0fa22b069b35af8098a30145103baaf5460fe334fb2b047597e458
                                                                                  • Instruction Fuzzy Hash: 8B31E37495122D9BCB21EF28DC89B9CBBB8BF48710F5041EAE50CA7290E7749F858F44
                                                                                  APIs
                                                                                  • FormatMessageW.KERNEL32(00001300,00000000,00000007,00000400,?,00000000,00000000,5D2E80A5,00000000,?), ref: 005A975B
                                                                                  • GetLastError.KERNEL32 ref: 005A9765
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateErrorFormatHeapLastMessage
                                                                                  • String ID:
                                                                                  • API String ID: 4114510652-0
                                                                                  • Opcode ID: 1d334de26afacbc94b22bc455950bb77512c87e01afb5b95bf9ff3a2eaa6009a
                                                                                  • Instruction ID: 3548d6a1638cd33a0b7cc0ebd4b5651c6f0552ac968a27f4d891f337a4d233f6
                                                                                  • Opcode Fuzzy Hash: 1d334de26afacbc94b22bc455950bb77512c87e01afb5b95bf9ff3a2eaa6009a
                                                                                  • Instruction Fuzzy Hash: C541D075A042169FDB10DF98CC467AEBBF4FB85714F14016EE919E7380EBB59A008B90
                                                                                  APIs
                                                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,005F4122,?,?,?,?,005F40E1,000000FF,?,?,?,005F41F4,00000000,?), ref: 005F438D
                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,5D2E80A5,?,?,00626272,000000FF,?,005F4122,?,?,?,?,005F40E1,000000FF,?), ref: 005F4391
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$FileSystem$Precise
                                                                                  • String ID:
                                                                                  • API String ID: 743729956-0
                                                                                  • Opcode ID: 00486202af87bc2e7132bec42d829108d22c2061a91aa61d9ff8b85af037b892
                                                                                  • Instruction ID: 4ff938f355930389dc595a41d5fa41953860824b789c6ba6e7a30a1862a36a4d
                                                                                  • Opcode Fuzzy Hash: 00486202af87bc2e7132bec42d829108d22c2061a91aa61d9ff8b85af037b892
                                                                                  • Instruction Fuzzy Hash: D3F06536908958EFCB119F54DC45F5EBBAAFB09B50F004626EC12D7790DB75A9009F90
                                                                                  APIs
                                                                                  • __set_se_translator.LIBVCRUNTIME ref: 0058CEA5
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00025C80), ref: 0058CEBB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled__set_se_translator
                                                                                  • String ID:
                                                                                  • API String ID: 2480343447-0
                                                                                  • Opcode ID: 6d6d598ac993a905a41073795961a08b2f1f86fa7c8ea77f5c23e77cc0d994d4
                                                                                  • Instruction ID: d293d17c2de8e0742a6ed49fbc68fa0d18b366d1051163ec6b12662562c4bbcd
                                                                                  • Opcode Fuzzy Hash: 6d6d598ac993a905a41073795961a08b2f1f86fa7c8ea77f5c23e77cc0d994d4
                                                                                  • Instruction Fuzzy Hash: C0D022319893415AFB18A3709D0EF193E86371230EF083005EC02213A2E2B45C408323
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: lY
                                                                                  • API String ID: 0-2569190583
                                                                                  • Opcode ID: 865b8410cbbeb498fa4215f7c3dd7fb49b7c5e723d3f428aa43bcfd74340cb25
                                                                                  • Instruction ID: 84ffa047e82417b945b0992721242a6ea12da3dbc9c425e20014a5582dbdc7ab
                                                                                  • Opcode Fuzzy Hash: 865b8410cbbeb498fa4215f7c3dd7fb49b7c5e723d3f428aa43bcfd74340cb25
                                                                                  • Instruction Fuzzy Hash: 3722C3B3B543104BD75CCE5DCCA23ADB2D3ABD4218B0E853DB48AC3342EA7DD9598685
                                                                                  APIs
                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,00000008,?,?,?,006091AE,?,?,00000008,?,?,0061449E,00000000), ref: 00609408
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise
                                                                                  • String ID:
                                                                                  • API String ID: 3997070919-0
                                                                                  • Opcode ID: 33f9d871bbf8236e0f1028fe5948410bfdc97e3e6b804669c287d8285bdc836f
                                                                                  • Instruction ID: c7cda75669338f983c0037bc47e81200cb1b8549f26782bf6b29fbe2f6122c56
                                                                                  • Opcode Fuzzy Hash: 33f9d871bbf8236e0f1028fe5948410bfdc97e3e6b804669c287d8285bdc836f
                                                                                  • Instruction Fuzzy Hash: 0EB129315506099FD719CF28C496BA67BE2FF45364F248658E89A8F3E2C335E982CB50
                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 005F4E16
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FeaturePresentProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 2325560087-0
                                                                                  • Opcode ID: dc51f88a32c1718824286766eef3fd951bbd2d1ec2f64cdb42aa21b93794220e
                                                                                  • Instruction ID: ef4d8aca74080d3153dce5bce562c0e9666b4d5eced576d0fb93a96a2c177e14
                                                                                  • Opcode Fuzzy Hash: dc51f88a32c1718824286766eef3fd951bbd2d1ec2f64cdb42aa21b93794220e
                                                                                  • Instruction Fuzzy Hash: 84A1AEB9900605CFDB28CF58D881AAEBBF2FB49710F14913AD615EB390D3799854CF60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cacd3de15828a3891de01f10c648a9135a613c4d0b416b71c5e0619c6e910a40
                                                                                  • Instruction ID: 0514437a6aa082e98f8174775fd41f7da6c2b32bced3a049dac5ad6707b6fcad
                                                                                  • Opcode Fuzzy Hash: cacd3de15828a3891de01f10c648a9135a613c4d0b416b71c5e0619c6e910a40
                                                                                  • Instruction Fuzzy Hash: C231C97590021DAFDB28DFA8CC89DEB7B7EEF84364F144668F90597285E631AD40CB50
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00001001,?,00000078), ref: 0060F970
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 5b9654ab81d6c8e19950cf2c7b7b70213561272b2b6e6ac0036569ee60fd664b
                                                                                  • Instruction ID: 84eb0dd135011d79b3ae7d4b7ced1346d537117148b02b0bae3d4b7f6323c404
                                                                                  • Opcode Fuzzy Hash: 5b9654ab81d6c8e19950cf2c7b7b70213561272b2b6e6ac0036569ee60fd664b
                                                                                  • Instruction Fuzzy Hash: 27218071A90206BBEB289B24DC46BBB77A9FF44300F10007AFD01C6591FB74ED408B90
                                                                                  APIs
                                                                                  • EnumSystemLocalesW.KERNEL32(0060F6C0,00000001,00000000,?,-00000050,?,0060FD03,00000000,?,?,?,00000055,?), ref: 0060F600
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2099609381-0
                                                                                  • Opcode ID: fb75261cc27174e5753ca151bc9cf44149dd3e1105630ac721b252fd5446ea30
                                                                                  • Instruction ID: ec3155ce4afc9f1d73b9082aed5a41d138c77898b0cbe1a083440fd7c600c07c
                                                                                  • Opcode Fuzzy Hash: fb75261cc27174e5753ca151bc9cf44149dd3e1105630ac721b252fd5446ea30
                                                                                  • Instruction Fuzzy Hash: 251125366407019FDB2C9F38C8916BBB792FF84358B19483DE98687B80D772A943CB40
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0060F9C6,00000000,00000000,?), ref: 0060FB77
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 692c761245e962b271edba1fa1f7b06e963aec75a948252c4037bc4548c4da73
                                                                                  • Instruction ID: da5f207ffe419773c76ea7c261f1b88ed14ae0d0318f405c8797e45ca31e7f82
                                                                                  • Opcode Fuzzy Hash: 692c761245e962b271edba1fa1f7b06e963aec75a948252c4037bc4548c4da73
                                                                                  • Instruction Fuzzy Hash: C901DB33A40112ABDB3C5B25C856AFB775ADB40354F15487CEC06E36C0DBB4ED42C990
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,00001002,?,00000078,-00000050,00000000,000000D0), ref: 0060F4F0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: utf8
                                                                                  • API String ID: 2299586839-905460609
                                                                                  • Opcode ID: 9d3cb79e01ce7cc3eb7ced80c2327df42f40f22f63d8819d92f547acd389842f
                                                                                  • Instruction ID: 6d9b0eb45be9cb07e7a2fbe8a221015324fca67e8891cf18b6795fc8bc91aa90
                                                                                  • Opcode Fuzzy Hash: 9d3cb79e01ce7cc3eb7ced80c2327df42f40f22f63d8819d92f547acd389842f
                                                                                  • Instruction Fuzzy Hash: F1F0A432A81204EBE724AB24DC4AFBB73E9EB44315F100079FA02D7181EAB4AD458690
                                                                                  APIs
                                                                                  • EnumSystemLocalesW.KERNEL32(0060F920,00000001,?,?,-00000050,?,0060FCCB,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0060F673
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2099609381-0
                                                                                  • Opcode ID: dfb345597053dfd2eb35acf5baddd8f2c66f05ce5bc25a19f2da5fe52712c9cf
                                                                                  • Instruction ID: 844b0b32bcb03c561d5d4c92b124d310e0a92f7dc839606988c71ba60ef3e027
                                                                                  • Opcode Fuzzy Hash: dfb345597053dfd2eb35acf5baddd8f2c66f05ce5bc25a19f2da5fe52712c9cf
                                                                                  • Instruction Fuzzy Hash: 06F0C2362403045FDB285F39D882ABB7B96EF85768B06453CF9458BAE0D6B2AC42C654
                                                                                  APIs
                                                                                  • EnumSystemLocalesW.KERNEL32(0060F4A0,00000001,?,?,?,0060FD25,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0060F57A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2099609381-0
                                                                                  • Opcode ID: 952eb7000c6fee414da313dfddbf3a501ec70ab9da8cfceff8095698e4660751
                                                                                  • Instruction ID: 738cd8e0373eb12708c95f6b6b87657c20050435e891eb39995cb913e0590f7f
                                                                                  • Opcode Fuzzy Hash: 952eb7000c6fee414da313dfddbf3a501ec70ab9da8cfceff8095698e4660751
                                                                                  • Instruction Fuzzy Hash: 98F0553A34020457CB289F39CC15BABBF96EFC1720B0A4068FE058B681C6759843C790
                                                                                  APIs
                                                                                    • Part of subcall function 00602301: EnterCriticalSection.KERNEL32(-006500C0,?,006048AB,00583AB6,0064ACC8,0000000C,00604B87,?), ref: 00602310
                                                                                  • EnumSystemLocalesW.KERNEL32(00606EA0,00000001,0064ADE8,0000000C,00607387,00000000), ref: 00606EF4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1272433827-0
                                                                                  • Opcode ID: 1225e7373e4488909a6df92359169d6f66bdacf317a2cb4d8690a31d5892b66b
                                                                                  • Instruction ID: 9a194b4ba53f7a45fc80ab95b4632e12fc37d834d71bbf68b1da81f1a77f0160
                                                                                  • Opcode Fuzzy Hash: 1225e7373e4488909a6df92359169d6f66bdacf317a2cb4d8690a31d5892b66b
                                                                                  • Instruction Fuzzy Hash: D1F04936A80705DFE704DF98E446B9E7BB2EB44726F10401AF5119B2E0D7B99900CB40
                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,006061AA,?,20001004,00000000,00000002,?,?,006057A8), ref: 006073FD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: b28d256a5cd33cd1b49d4030fc571ded3c4e0625a8f975e95a18b17ea0ad77b8
                                                                                  • Instruction ID: 4cfac92ee74a45d274eeb1a67369eae859238034a47b2c7dbdc1011cd53994ad
                                                                                  • Opcode Fuzzy Hash: b28d256a5cd33cd1b49d4030fc571ded3c4e0625a8f975e95a18b17ea0ad77b8
                                                                                  • Instruction Fuzzy Hash: C3E04F31988528BBCF172F60EC05EDF3E5BEF44760F008014FC05662A0CB719E22AAE5
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_000754E0,005F4BC5), ref: 005F54D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: de76a3524050218f054bb9fec7fc51ac2c9dd3409e9fbfbcccd2f983660aa0e6
                                                                                  • Instruction ID: f82fa0f78b0636df76c4f7d7f08c4c5129513053ebfe613d68f3add2b7f21b5d
                                                                                  • Opcode Fuzzy Hash: de76a3524050218f054bb9fec7fc51ac2c9dd3409e9fbfbcccd2f983660aa0e6
                                                                                  • Instruction Fuzzy Hash:
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e8529dd28cf83689b628fa2e636785774dffd735feb49cbcd5c55afa27603425
                                                                                  • Instruction ID: 3b4100c26ac4e6c5ebd619e362b831de1f7c64518415d8b55e43260d15dab524
                                                                                  • Opcode Fuzzy Hash: e8529dd28cf83689b628fa2e636785774dffd735feb49cbcd5c55afa27603425
                                                                                  • Instruction Fuzzy Hash: D1228071A002999FCF19DFA9C884AAEBFB5FF48310F154169E895A7351D730ED42CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4ef3be530bfafb39ad1c963e845329dcc33d178391d6db0e528142937a9bcaea
                                                                                  • Instruction ID: eae40e1c654becd5704eff4f02064a35e1e410307a1edbc0d51e16557a26add1
                                                                                  • Opcode Fuzzy Hash: 4ef3be530bfafb39ad1c963e845329dcc33d178391d6db0e528142937a9bcaea
                                                                                  • Instruction Fuzzy Hash: 04325971A00299DFCF18DF99C984AAEBFF6BF48310F254069E855AB351C771AD42CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f58414c0b673af1800e9b3e372db1e32d8be72ea2b7c5eedc4ed8f846be977e0
                                                                                  • Instruction ID: c9e65c6d7286bd76b293747757f8c031944da737d9a3e4c24d50c1a6ed039ee4
                                                                                  • Opcode Fuzzy Hash: f58414c0b673af1800e9b3e372db1e32d8be72ea2b7c5eedc4ed8f846be977e0
                                                                                  • Instruction Fuzzy Hash: FE326770900289DFDB14DF58C998BAEBFB1BF45304F148199E949AB392C7B5AD84CF90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6fe832cafeae4252b426330cf67226a48b717919387d1670b98870811c6abd5d
                                                                                  • Instruction ID: 3825206153e6ae3ade3768e43ba61b960200c95383570c1b83d0ad6f76c57973
                                                                                  • Opcode Fuzzy Hash: 6fe832cafeae4252b426330cf67226a48b717919387d1670b98870811c6abd5d
                                                                                  • Instruction Fuzzy Hash: C202B2727046618BDB0CCE1AC59023ABBE2BBD8305F154A2EE4DB97785CE70D945CB85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f4a26d3d0068d333128e478cc03abba89a6308d429f30366cfccf0139d9b6914
                                                                                  • Instruction ID: d6ed710d5f689397b65550652a5e3a4a0e31eb5b2c0c9d4b8a4afbf58c8972dd
                                                                                  • Opcode Fuzzy Hash: f4a26d3d0068d333128e478cc03abba89a6308d429f30366cfccf0139d9b6914
                                                                                  • Instruction Fuzzy Hash: 3C02C57060060E8FCB24CF28C54AABABFF6FF49314F244A1DD656972A1D779AC42CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f626a188eeede66bdb94c2f42d6a614b61170ad88781ccac3e991e26fbdd62fe
                                                                                  • Instruction ID: caa7a2dd3821f3d70cc7c6e764466dbc301173dde2e784c6bc8ca5b5a0d96178
                                                                                  • Opcode Fuzzy Hash: f626a188eeede66bdb94c2f42d6a614b61170ad88781ccac3e991e26fbdd62fe
                                                                                  • Instruction Fuzzy Hash: 47023F72A083118BC75CCF1AD89056BF7E2BFCC314F19892EF49A93351DB74A945CA86
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5d460bc24410746e76f1553d2f61ccc9f5a4ab6fe12cf33eb9f3cd4ecc76b506
                                                                                  • Instruction ID: 9a1cb410b1f9e97201d54cc46848dd7ebfba86da88d4a966657be293ce7acfdf
                                                                                  • Opcode Fuzzy Hash: 5d460bc24410746e76f1553d2f61ccc9f5a4ab6fe12cf33eb9f3cd4ecc76b506
                                                                                  • Instruction Fuzzy Hash: 6FE1CB7490060E8FCB24CF68C494ABABFB6FB55310F144A1DDA569B691C73DAC46CF60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e206b806fc2f2d15c42555acfeba3d2c160a7d8809909fbe2a5ce934a7d32e61
                                                                                  • Instruction ID: afc1470b7f26ed4debeea64e9a9d19a3a898099422800d0fad3c67831bef4f7d
                                                                                  • Opcode Fuzzy Hash: e206b806fc2f2d15c42555acfeba3d2c160a7d8809909fbe2a5ce934a7d32e61
                                                                                  • Instruction Fuzzy Hash: FDE19D72A083059FCB18CF19D49056EFBE2FFD8310F598A6DE48A57354DA70AD09CB82
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1a07a358b833efd2f37456dde5c9778dc8c76f36133231a96c1b349a37607ecd
                                                                                  • Instruction ID: 97364b4db20dc58013537f2a1f113c7cdad7c5e0875a977c64cb89deeb107864
                                                                                  • Opcode Fuzzy Hash: 1a07a358b833efd2f37456dde5c9778dc8c76f36133231a96c1b349a37607ecd
                                                                                  • Instruction Fuzzy Hash: 91F172B45143A18BD748CF1ADCE042A77E2FBCA312F45490EF5D68B395C235E61ACBA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 199cfc18c002d48e62d1bdb909b82483c2a5622abf8f1ed7ee51bce9fef951c7
                                                                                  • Instruction ID: 06734ec0600a096274e0b425a1b86303b2db719bb3745c4940f2b5ed7b86e655
                                                                                  • Opcode Fuzzy Hash: 199cfc18c002d48e62d1bdb909b82483c2a5622abf8f1ed7ee51bce9fef951c7
                                                                                  • Instruction Fuzzy Hash: 73916E32D41E098ADB1ACF68C8453DFB773AF46360F299285DC657B3D2DB3498868760
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6260f7346573ee0492d7d087c9a02f31b07962f178dacaa3a5896be440bf1b46
                                                                                  • Instruction ID: 95c9f70f66765b868044832a0c064d130e0d7a1055379eefc5a4e34908be5973
                                                                                  • Opcode Fuzzy Hash: 6260f7346573ee0492d7d087c9a02f31b07962f178dacaa3a5896be440bf1b46
                                                                                  • Instruction Fuzzy Hash: 27714C71A082168FC718DF29C84166ABBF2FFD8350F158A2DE996E7254E730E954CBC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b93427a4c3b2901b25d4b8cc7a15ad103625c5b02533139ca114d6ba6127404e
                                                                                  • Instruction ID: b76d1e0b255bfcffcb666e7a75836116a60c3c2446683ce2f38ae1b63f6d3f75
                                                                                  • Opcode Fuzzy Hash: b93427a4c3b2901b25d4b8cc7a15ad103625c5b02533139ca114d6ba6127404e
                                                                                  • Instruction Fuzzy Hash: 81714C76E101198FCB08DFACC8855ADBBF5FB88710F1A4669E815FB345E770A910CBA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ca6a5bc58de809013063d6a2681a055a54a9f030fd3cdf8c7f79c10b0e74bf7e
                                                                                  • Instruction ID: 058a7d43a967817002c084b33c0b5b4db7e84bcdc41db8ffaad28ceb426e4988
                                                                                  • Opcode Fuzzy Hash: ca6a5bc58de809013063d6a2681a055a54a9f030fd3cdf8c7f79c10b0e74bf7e
                                                                                  • Instruction Fuzzy Hash: B0416972B187A10BCB1C8A2D8C95169BEC2BBD5321F0A8B7DD8D697386C5B48D0DC790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 59845c80f73a15e3b05cb42bff5b3d653e629c8e708305577ecb24b55e42dd06
                                                                                  • Instruction ID: 5a17ec922d0b1b87e8635d23dbafa4d083c3b2a8dafa7a6e663e9973c718b12f
                                                                                  • Opcode Fuzzy Hash: 59845c80f73a15e3b05cb42bff5b3d653e629c8e708305577ecb24b55e42dd06
                                                                                  • Instruction Fuzzy Hash: E041B072B1421A4BC708EE2DD84553EB7F6ABE8304F548A2DE806D7254FB30DA15C7C5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ce3f57fe918f0e36527b7964921b8d4cc73bf0c19e104463457388a5a553049b
                                                                                  • Instruction ID: 0e7604cdf890282acceb8001d247f19711d962f5591ca85597e123170190d2ee
                                                                                  • Opcode Fuzzy Hash: ce3f57fe918f0e36527b7964921b8d4cc73bf0c19e104463457388a5a553049b
                                                                                  • Instruction Fuzzy Hash: 2A315B716242B51FD7108B1E8C41539BAD2EBC7216F4941FAE4E5CB342D378DA06DBE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5941555875965a3a5c5beaa238375d84f0a68d8032d79d3bfd7eba04945614c6
                                                                                  • Instruction ID: 83588e9b7c93dd1daa65336f423c0558d0daafe6849c214bc32e1805c26a9471
                                                                                  • Opcode Fuzzy Hash: 5941555875965a3a5c5beaa238375d84f0a68d8032d79d3bfd7eba04945614c6
                                                                                  • Instruction Fuzzy Hash: C521E736720A124B9B4CCB3DDC7667976E2E384341B88967EE95BCB3D1E7388515C740
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f3395c45eef9510d8e6ba7a1e4d1d4521fa8a1af8b18e96eb7d1c28856ff8121
                                                                                  • Instruction ID: 658c92737d260dd7f9945421116997a3885e6d984753fa2918fcbc96259025f0
                                                                                  • Opcode Fuzzy Hash: f3395c45eef9510d8e6ba7a1e4d1d4521fa8a1af8b18e96eb7d1c28856ff8121
                                                                                  • Instruction Fuzzy Hash: BE21A4715102625BD71ECE2EC8445B6FB91FBC5305F82836AED80DB289C639F825C7D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9e12790dad87ec2532e809a9eef8ff034ad4c78d338c3fea1aea289e885726f6
                                                                                  • Instruction ID: 1a4d6ce91bd1bac4b7f3532922f2fc02ec2841b0ee9a9f8bce747635ff71235e
                                                                                  • Opcode Fuzzy Hash: 9e12790dad87ec2532e809a9eef8ff034ad4c78d338c3fea1aea289e885726f6
                                                                                  • Instruction Fuzzy Hash: 5D1148315101714BDB1EDD3ED888576BB94FB81315F86836ADD81AB189C625FC29C3E1
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,5D2E80A5,?,00000000), ref: 005D6ACD
                                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6AEB
                                                                                  • GetFileTime.KERNEL32(00000000,00000000,00000000,005D0E15,?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF), ref: 005D6B0C
                                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6B16
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6B34
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6BA0
                                                                                  • FileTimeToSystemTime.KERNEL32(005D0E15,00638E10,?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?), ref: 005D6BB5
                                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6BBF
                                                                                  • SystemTimeToFileTime.KERNEL32(00638E10,005D0E15,?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?), ref: 005D6C26
                                                                                  • SystemTimeToFileTime.KERNEL32(00638DFE,00632ECC,?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?), ref: 005D6C47
                                                                                  • CompareFileTime.KERNEL32(00632ECC,005D0E15,?,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?), ref: 005D6C5D
                                                                                  • PathFileExistsW.SHLWAPI(00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6CCF
                                                                                  • CreateFileW.KERNEL32(00000000,C0000000,00000000,0000000C,00000002,00000080,00000000,S-1-5-18,?,00000001,S-1-1-0,?,00000001), ref: 005D6D3B
                                                                                  • GetLastError.KERNEL32(?,00000001,S-1-1-0,?,00000001,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15), ref: 005D6D4D
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000001,S-1-1-0,?,00000001,?,?,?,?,?,?,?,00623B2D,000000FF), ref: 005D6D59
                                                                                  • CopyFileExW.KERNEL32(?,00000000,005D7340,00638DA8,00000000,00000000,?,?,?,?,?,?,?,00623B2D,000000FF), ref: 005D6D91
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6D9B
                                                                                  • DeleteFileW.KERNEL32(006389C4,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6E44
                                                                                  • MoveFileW.KERNEL32(00000000,006389C4), ref: 005D6E4F
                                                                                  • CopyFileW.KERNEL32(00000000,006389C4,00000000,?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6E5F
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,00623B2D,000000FF,?,005D0E15,?,?), ref: 005D6E69
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Time$ErrorLast$CloseHandleSystem$CopyCreate$CompareDeleteExistsMovePath
                                                                                  • String ID: .part$S-1-1-0$S-1-5-18
                                                                                  • API String ID: 1792433798-2727065896
                                                                                  • Opcode ID: 662531654e7ead8ef117d419ac60cae8397f8c9595f400636a4219db77a6e793
                                                                                  • Instruction ID: 37fc67dc33989eb83f01e8cdf9d2c7c5bef61ee66f909c7af5f3d34e2e458d4c
                                                                                  • Opcode Fuzzy Hash: 662531654e7ead8ef117d419ac60cae8397f8c9595f400636a4219db77a6e793
                                                                                  • Instruction Fuzzy Hash: 81F19D74A002159FDB24DFA8DC99BAEBFB9FF08310F14415AE801A7391DB709D46CB91
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005D5F3D
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005D5F52
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005D5F69
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 005D5F82
                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005D5F96
                                                                                  • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 005D5FA4
                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005D5FB7
                                                                                  • GetDlgItem.USER32(?,0000E801), ref: 005D5FC4
                                                                                  • IsWindow.USER32(00000000), ref: 005D5FCD
                                                                                  • DestroyWindow.USER32(00000000,?,00000000), ref: 005D5FE9
                                                                                  • GetClientRect.USER32(?,?), ref: 005D6041
                                                                                  • GetDlgItem.USER32(?,0000E801), ref: 005D6060
                                                                                  • IsWindow.USER32(00000000), ref: 005D6067
                                                                                  • CreateWindowExW.USER32(00000000,SCROLLBAR,00000000,5402001C,?,?,?,?,?,0000E801,00000000), ref: 005D60AC
                                                                                  • IsWindow.USER32(00000000), ref: 005D60B5
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005D60D1
                                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 005D60E6
                                                                                  • GetClientRect.USER32(?,?), ref: 005D6143
                                                                                  • GetWindowRect.USER32(?,?), ref: 005D614B
                                                                                  • GetDlgItem.USER32(?,0000042B), ref: 005D61E3
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005D61F7
                                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 005D620C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$LongRect$Item$ClientMessagePointsSend$CreateDestroy
                                                                                  • String ID: SCROLLBAR
                                                                                  • API String ID: 3826962570-324577739
                                                                                  • Opcode ID: 8e7c753edbc513b5eb352501f048da843849d6d79731466e7d3ee127e8d90bef
                                                                                  • Instruction ID: e5a18b085a5748c428962d7201c8b774470d10907fcab5bd297046123defc890
                                                                                  • Opcode Fuzzy Hash: 8e7c753edbc513b5eb352501f048da843849d6d79731466e7d3ee127e8d90bef
                                                                                  • Instruction Fuzzy Hash: 5EB15774509701EFD720DF68C849F5ABBE6FF88710F104A1AF995973A0EB31A841CB92
                                                                                  APIs
                                                                                  • CoTaskMemAlloc.OLE32(?,5D2E80A5,?,00000000,00000000), ref: 005A0C79
                                                                                  • CharNextW.USER32(?,00000000,00000000), ref: 005A0CF8
                                                                                  • CharNextW.USER32(00000000,?,00000000,00000000), ref: 005A0D01
                                                                                  • CharNextW.USER32(00000000,?,00000000,00000000), ref: 005A0D0A
                                                                                  • CharNextW.USER32(00000000,?,00000000,00000000), ref: 005A0D13
                                                                                  • CharNextW.USER32(?,?,00000000,00000001,5D2E80A5,?,00000000,00000000), ref: 005A0D5D
                                                                                  • CharNextW.USER32(?,?,00000000,00000001,5D2E80A5,?,00000000,00000000), ref: 005A0D71
                                                                                  • CharNextW.USER32(00000000,}},00000009,?,00000000,00000001,5D2E80A5,?,00000000,00000000), ref: 005A0DEE
                                                                                  • CharNextW.USER32(00000000,?,00000000,00000001,5D2E80A5,?,00000000,00000000), ref: 005A0E27
                                                                                  • EnterCriticalSection.KERNEL32(0000001B,00000001,5D2E80A5,?,00000000,00000000), ref: 005A0E70
                                                                                  • lstrcmpiW.KERNEL32(?,?,?,00000000,00000000), ref: 005A0E8A
                                                                                  • LeaveCriticalSection.KERNEL32(0000001B,?,00000000,00000000), ref: 005A0E9E
                                                                                  • LeaveCriticalSection.KERNEL32(0000001B,?,00000000,00000000), ref: 005A0ECE
                                                                                  • CharNextW.USER32(00000000,?,?), ref: 005A0F21
                                                                                  • CharNextW.USER32(?,00000000,00000001,5D2E80A5,?,00000000,00000000), ref: 005A0F44
                                                                                  • CoTaskMemFree.OLE32(00000000,5D2E80A5,?,00000000,00000000), ref: 005A0F92
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharNext$CriticalSection$LeaveTask$AllocEnterFreelstrcmpi
                                                                                  • String ID: }}$HKCR$HKCU{Software{Classes
                                                                                  • API String ID: 3576304915-1142484189
                                                                                  • Opcode ID: 1c44d268e0c7ea7e55fb6bfdf89a709c9916fbc17d92acecc3a3e6f32724504d
                                                                                  • Instruction ID: 0569caa20e11ac5cfbd9a6d1d4e8a6960e106cfc9dad5a452bf948585eea5c3b
                                                                                  • Opcode Fuzzy Hash: 1c44d268e0c7ea7e55fb6bfdf89a709c9916fbc17d92acecc3a3e6f32724504d
                                                                                  • Instruction Fuzzy Hash: AFD1C075A243459FCB20DFA4C858BAEBFB9BF0A700F245569E845EB2C1E7749D04CB90
                                                                                  APIs
                                                                                  • InitializeCriticalSection.KERNEL32(00650AF0,5D2E80A5), ref: 005ABDB3
                                                                                  • EnterCriticalSection.KERNEL32(00650AF0,5D2E80A5), ref: 005ABDC8
                                                                                  • GetCurrentProcess.KERNEL32 ref: 005ABDD5
                                                                                  • GetCurrentThread.KERNEL32 ref: 005ABDE3
                                                                                  • SymSetOptions.IMAGEHLP(80000016), ref: 005ABE0F
                                                                                  • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr,00000000), ref: 005ABE7D
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 005ABE84
                                                                                  • SymInitialize.IMAGEHLP(00000000,00000000,00000001,006337C0,00000000), ref: 005ABECC
                                                                                  • StackWalk.IMAGEHLP(0000014C,?,?,?,?,00000000,00000000,*** Stack Trace (x86) ***,?,?,?), ref: 005AC00F
                                                                                  • GetModuleHandleW.KERNEL32(00000000,*** Stack Trace (x86) ***,?,?,?), ref: 005AC0C0
                                                                                  • SymCleanup.IMAGEHLP(?,?), ref: 005AC1A2
                                                                                  • LeaveCriticalSection.KERNEL32(00650AF0,?), ref: 005AC1CD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CurrentInitialize$AddressCleanupEnterHandleLeaveLibraryLoadModuleOptionsProcProcessStackThreadWalk
                                                                                  • String ID: *** Stack Trace (x86) ***$<--------------------MORE--FRAMES-------------------->$Dbghelp.dll$MODULE_BASE_ADDRESS$SymFromAddr$[0x%.8Ix]
                                                                                  • API String ID: 4282195395-80696534
                                                                                  • Opcode ID: 670eb6702d4288b75c2b8c60a30111c1b2535201f25c04c5bddc8de5b008d9e7
                                                                                  • Instruction ID: 663c172acd06ca6404d3da849fcfbcaa3df568ea8c7fefa4f9da1f5716f5a52c
                                                                                  • Opcode Fuzzy Hash: 670eb6702d4288b75c2b8c60a30111c1b2535201f25c04c5bddc8de5b008d9e7
                                                                                  • Instruction Fuzzy Hash: 96C1CC71900A699FDB20DB24CC49BEEBFB5BF46305F1042D8E509A7292DB742B85CF91
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,5D2E80A5,?,?,?,?,?,?,?,?,5D2E80A5,006191F5,000000FF,?,0059A02A), ref: 0059AC93
                                                                                  • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 0059AC99
                                                                                  • LoadLibraryW.KERNEL32(combase.dll,CoIncrementMTAUsage,?,?,?,?,?,?,5D2E80A5,006191F5,000000FF,?,0059A02A,00634350,5D2E80A5), ref: 0059ACE0
                                                                                  • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 0059ACE6
                                                                                  • CoInitializeEx.OLE32(00000000,00000000,5D2E80A5,?,?,?,0061922D,000000FF), ref: 0059B005
                                                                                    • Part of subcall function 00598780: SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?), ref: 00598890
                                                                                    • Part of subcall function 005F3148: GetCurrentThreadId.KERNEL32 ref: 005F3173
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc$CurrentFolderInitializePathThread
                                                                                  • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                                                                                  • API String ID: 2148253048-2454113998
                                                                                  • Opcode ID: e3f53675a6636ef64a66d4de4f867027f64d2b5ad2b58517cb578396cbcd1e0c
                                                                                  • Instruction ID: 278ddfe3f009f5a407396449ceb2c9f880fe4fc599a05e130bc1a9c83652eff3
                                                                                  • Opcode Fuzzy Hash: e3f53675a6636ef64a66d4de4f867027f64d2b5ad2b58517cb578396cbcd1e0c
                                                                                  • Instruction Fuzzy Hash: 81D19A70D0061AEFDF25DFA8D859BAEBFB5FF88710F144119E501A7290DB74AA40CBA1
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(00000007,000001F6), ref: 005B1458
                                                                                  • GetDlgItem.USER32(00000007,000001F8), ref: 005B1468
                                                                                  • GetDlgItem.USER32(00000007,000001F7), ref: 005B14AE
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 005B14C1
                                                                                  • ShowWindow.USER32(00000000,00000005), ref: 005B151F
                                                                                  • GetDlgItem.USER32(00000007,000001F7), ref: 005B1545
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 005B1558
                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 005B15B5
                                                                                  • ShowWindow.USER32(?,00000000), ref: 005B15C0
                                                                                  • SetWindowPos.USER32(00000007,00000000,00000000,00000000,?,?,00000616), ref: 005B160D
                                                                                  • GetDlgItem.USER32(?,000000FF), ref: 005B1640
                                                                                  • IsWindow.USER32(00000000), ref: 005B164A
                                                                                  • IsRectEmpty.USER32(?), ref: 005B1667
                                                                                  • SetWindowPos.USER32(000000FF,00000000,?,?,?,?,00000014,?,000000FF,?,?,00000616), ref: 005B1697
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Item$Show$Text$EmptyRect
                                                                                  • String ID: Details <<$Details >>
                                                                                  • API String ID: 4171068809-3763984547
                                                                                  • Opcode ID: 398d8b223350f99b6e2fa71cecb413df19cc21cefe8847cc2be2c3ddde9b0b53
                                                                                  • Instruction ID: d2f668daa92f57469e00cbe39910c7d4ca2ef191bd2a24049c3805539d699bea
                                                                                  • Opcode Fuzzy Hash: 398d8b223350f99b6e2fa71cecb413df19cc21cefe8847cc2be2c3ddde9b0b53
                                                                                  • Instruction Fuzzy Hash: 5F81A071900605AFDB24DFA8CC5ABAEBBB6FF94700F14821DF912A6691D730B941CF54
                                                                                  APIs
                                                                                  • InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,5D2E80A5), ref: 0059FEE8
                                                                                  • GetLastError.KERNEL32 ref: 0059FEF2
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 0059FF64
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?), ref: 0059FF91
                                                                                  • GetModuleFileNameW.KERNEL32(00580000,?,00000104), ref: 0059FFEA
                                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 005A0052
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 005A0063
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 005A011B
                                                                                  • LeaveCriticalSection.KERNEL32(?,Module,?), ref: 005A014F
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 005A0174
                                                                                  • LeaveCriticalSection.KERNEL32(?,Module_Raw,?), ref: 005A01A8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Enter$Leave$Module$ErrorFileHandleInitializeLastName
                                                                                  • String ID: 8Fc$Module$Module_Raw$REGISTRY
                                                                                  • API String ID: 2998937331-1165359549
                                                                                  • Opcode ID: 91af5152a9cf39540979decaa191816927b916710e1f2d7809045496311bd2da
                                                                                  • Instruction ID: 01810fb7a4221e4d9b1e9fd2338011057b075b010f19e289d200bad93cd671b5
                                                                                  • Opcode Fuzzy Hash: 91af5152a9cf39540979decaa191816927b916710e1f2d7809045496311bd2da
                                                                                  • Instruction Fuzzy Hash: F8B19F75A043188BDB20CF64CC48B9EBBB5BF8A300F1445E9E509A7680E7759E85CF92
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,?), ref: 005D6685
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005D6695
                                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 005D66C1
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 005D69AE
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 005D69D7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rect$InvalidateItemPoints
                                                                                  • String ID:
                                                                                  • API String ID: 2775623374-0
                                                                                  • Opcode ID: 6d9b64fc539ab417aed718774c565e16e51abd5f64ed34d3a808873e04217944
                                                                                  • Instruction ID: d460663d908462b25bf3295db53c252b72335971caf30fd9472a6405f04e71df
                                                                                  • Opcode Fuzzy Hash: 6d9b64fc539ab417aed718774c565e16e51abd5f64ed34d3a808873e04217944
                                                                                  • Instruction Fuzzy Hash: 1DD13671608706AFD718CF6CC999A6ABBE5BF88304F089A1EF989C7354D770E841CB51
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,5D2E80A5,00000000,?,?,?,?,?,?,?,?,?,?,?,5D2E80A5), ref: 00597273
                                                                                  • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00597279
                                                                                  • GetErrorInfo.OLEAUT32(00000000,00000000), ref: 005972D0
                                                                                  • LoadLibraryW.KERNEL32(?,.dll,-00000001,00000000,006337C0,00000000,00000000,00000000), ref: 0059743B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$AddressErrorInfoProc
                                                                                  • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                                                                                  • API String ID: 3571556279-2454113998
                                                                                  • Opcode ID: c8ceb530300ae49128db95c06a5cb9b58074a57203f59922a82443ac39af7a3c
                                                                                  • Instruction ID: bb212ebda099fd479046df8a4a59ca1a6ea5988ae23f1cb4a53648001ba29818
                                                                                  • Opcode Fuzzy Hash: c8ceb530300ae49128db95c06a5cb9b58074a57203f59922a82443ac39af7a3c
                                                                                  • Instruction Fuzzy Hash: 37B17A70D14619EFCF10DFA8D849BADBFB5BF88710F15455AE801AB290DB74AE41CB90
                                                                                  APIs
                                                                                    • Part of subcall function 005A98C0: LoadLibraryW.KERNEL32(ComCtl32.dll,5D2E80A5,00000007,00000007,?), ref: 005A98FA
                                                                                    • Part of subcall function 005A98C0: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 005A9920
                                                                                    • Part of subcall function 005A98C0: FreeLibrary.KERNEL32(00000000), ref: 005A99A9
                                                                                  • GetDlgItem.USER32(?,000001F4), ref: 005B112B
                                                                                  • SendMessageW.USER32(00000000,00000170,00000000,00000000), ref: 005B113A
                                                                                  • GetDC.USER32(00000000), ref: 005B1146
                                                                                  • GetDeviceCaps.GDI32(00000000), ref: 005B114D
                                                                                  • MulDiv.KERNEL32(00000009,00000000), ref: 005B1156
                                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,Courier New), ref: 005B117F
                                                                                  • GetDlgItem.USER32(?,000001F6), ref: 005B1190
                                                                                  • IsWindow.USER32(00000000), ref: 005B1199
                                                                                  • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 005B11B0
                                                                                  • GetDlgItem.USER32(?,000001F8), ref: 005B11BE
                                                                                  • GetWindowRect.USER32(?,?), ref: 005B11CD
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005B11E1
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005B11F5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemRect$LibraryMessageSend$AddressCapsCreateDeviceFontFreeLoadProc
                                                                                  • String ID: Courier New
                                                                                  • API String ID: 1731048342-2572734833
                                                                                  • Opcode ID: 86147b59cf1777de4f73e41724a0678d62ceb1421420f4ac889289e10c9e8098
                                                                                  • Instruction ID: 25b67f69bfaf315579f40730c67398064e2090efdd35ddc55dccef0350529229
                                                                                  • Opcode Fuzzy Hash: 86147b59cf1777de4f73e41724a0678d62ceb1421420f4ac889289e10c9e8098
                                                                                  • Instruction Fuzzy Hash: 15415671784701BBFB249F209C4BFBA3BA5FF48B05F101528BB05AD1D2DAB0B8448B54
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(Advapi32.dll), ref: 005A4BA2
                                                                                  • GetLastError.KERNEL32 ref: 005A4BD0
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  • GetProcAddress.KERNEL32(00000000,ConvertStringSidToSidW), ref: 005A4BE6
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 005A4C02
                                                                                  • GetLastError.KERNEL32 ref: 005A4C0F
                                                                                  • GetLastError.KERNEL32 ref: 005A4E06
                                                                                  • GetLastError.KERNEL32 ref: 005A4E6B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Library$AddressAllocateFreeHeapLoadProc
                                                                                  • String ID: Advapi32.dll$ConvertStringSidToSidW
                                                                                  • API String ID: 3460774402-1129428314
                                                                                  • Opcode ID: 16fe1159c60e10d434616b4286cb63bd87ee978adc585990b19893db4fa4c775
                                                                                  • Instruction ID: f243d7dfda82c0f05105bca8c1487016e705ea77049dd6710464d9eb97e42f27
                                                                                  • Opcode Fuzzy Hash: 16fe1159c60e10d434616b4286cb63bd87ee978adc585990b19893db4fa4c775
                                                                                  • Instruction Fuzzy Hash: 8FF15AB1C0120AEFDB10DFA4D945BAEBBB5FF85310F208119E915B7280E775AA45CFA1
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,5D2E80A5,?,?,00000000), ref: 005D178F
                                                                                  • GetLastError.KERNEL32 ref: 005D17B0
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 005D17C0
                                                                                  • GetLastError.KERNEL32 ref: 005D17CD
                                                                                  • CloseHandle.KERNEL32(?), ref: 005D1A94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLast$AllocateCloseCreateHandleHeapSize
                                                                                  • String ID: ISO-8859-1$US-ASCII$utf-16$utf-8
                                                                                  • API String ID: 4082270022-3020978663
                                                                                  • Opcode ID: d8ffce3fe3fb45d3f67a0b019282502c9d735bcdfb4b99b99c2042d904e9c85a
                                                                                  • Instruction ID: a7aaaaa569c017ff3a2aad331c564a0e6f4ea3677f60bd448d88c3a46cd5b265
                                                                                  • Opcode Fuzzy Hash: d8ffce3fe3fb45d3f67a0b019282502c9d735bcdfb4b99b99c2042d904e9c85a
                                                                                  • Instruction Fuzzy Hash: 18A1F771A00B06AFDB20DF68CC59FAEBFB9BF44310F14452AE901A7391DB749905CBA5
                                                                                  APIs
                                                                                  • InitializeCriticalSection.KERNEL32(00650A68,5D2E80A5,00000000,?), ref: 005AA78C
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • EnterCriticalSection.KERNEL32(?,5D2E80A5,00000000,?), ref: 005AA799
                                                                                  • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA7CB
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA7D4
                                                                                  • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,00634EF4,00000001,?,?,000000FF,00000000), ref: 005AA86C
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA875
                                                                                  • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,?,?,000000FF,00000000), ref: 005AA8BD
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA8C6
                                                                                  • WriteFile.KERNEL32(00000000,?,?,000000FF,00000000,006337E8,00000002,?,?,000000FF,00000000), ref: 005AA935
                                                                                  • FlushFileBuffers.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA93E
                                                                                  • LeaveCriticalSection.KERNEL32(00000000,?,?,000000FF,00000000), ref: 005AA97A
                                                                                    • Part of subcall function 00585350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0059E648,-00000010), ref: 00585373
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFlushWrite$CriticalSection$EnterFindHeapInitializeLeaveProcessResource
                                                                                  • String ID: 7c
                                                                                  • API String ID: 3680465103-2693596234
                                                                                  • Opcode ID: b38c264f9371bb6faa99f3c005fed5fe60deed5effde234ea94de4a95ed3d703
                                                                                  • Instruction ID: 2965b85647f39d24007bd7b9edd8c2083b60fa5a65349722bac014da8b8a434b
                                                                                  • Opcode Fuzzy Hash: b38c264f9371bb6faa99f3c005fed5fe60deed5effde234ea94de4a95ed3d703
                                                                                  • Instruction Fuzzy Hash: 1571CA71A006059FDB10DF68CC49BAEBFB6FF45320F144188E811A73A2DB359E06CBA1
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005B07A9
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005B07BE
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005B07D4
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 005B07E7
                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005B07FA
                                                                                  • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 005B0808
                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005B081B
                                                                                  • GetClientRect.USER32(?,?), ref: 005B0830
                                                                                  • GetClientRect.USER32(?,?), ref: 005B0858
                                                                                  • GetWindowRect.USER32(?,?), ref: 005B0860
                                                                                  • GetDlgItem.USER32(?,?), ref: 005B0897
                                                                                  • IsWindow.USER32(00000000), ref: 005B08A2
                                                                                  • GetWindowRect.USER32(?,?), ref: 005B08BD
                                                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 005B08CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$Rect$ClientMessageSend$ItemPoints
                                                                                  • String ID:
                                                                                  • API String ID: 3417004906-0
                                                                                  • Opcode ID: 24047c24d219739141cc1092024d8c19fb00861b3b03e8bf4ecf95e8f89ff7ae
                                                                                  • Instruction ID: 2fc0297f8f906cbaa40566a8d7f716123bdc388406029c74759cd237b2d73ed4
                                                                                  • Opcode Fuzzy Hash: 24047c24d219739141cc1092024d8c19fb00861b3b03e8bf4ecf95e8f89ff7ae
                                                                                  • Instruction Fuzzy Hash: CE415B70508702DFD720DF28DC89B6BBBE5FF98710F205B1DF896961A1DB30A9858B61
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005BBEE7
                                                                                  • GetParent.USER32(00000000), ref: 005BBEFA
                                                                                  • GetWindow.USER32(00000000,00000004), ref: 005BBF05
                                                                                  • GetWindowRect.USER32(?,?), ref: 005BBF13
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 005BBF26
                                                                                  • MonitorFromWindow.USER32(?,00000002), ref: 005BBF3E
                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 005BBF54
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005BBF7A
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 005BC035
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$LongMonitorRect$FromInfoParent
                                                                                  • String ID:
                                                                                  • API String ID: 1468510684-0
                                                                                  • Opcode ID: 2f40de9c5d66602bb66519306fd46f847c70b3feaf6a5bf839bbf2cb6efacd55
                                                                                  • Instruction ID: c84cc77d5cb7ae995103b71c5ccdbd25229a05661ec8ba2a430fa0dc351a74f1
                                                                                  • Opcode Fuzzy Hash: 2f40de9c5d66602bb66519306fd46f847c70b3feaf6a5bf839bbf2cb6efacd55
                                                                                  • Instruction Fuzzy Hash: 14514D72904519EFDB20CF68CD49AEEBBBAFB44710F245229F815E3290DB70AD419B50
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32 ref: 005D09C2
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000000,.part,00000005,?,?,?), ref: 005D0AFC
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 005D0B31
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005D0B55
                                                                                  • ResetEvent.KERNEL32(?,00000000,00638A34,00000000,00000000,00000000,00000000,00000000,?), ref: 005D0E6B
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005D0E94
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005D0EA2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileObjectSingleWait$CloseCreateErrorEventHandleLastResetSize
                                                                                  • String ID: #$.part$<
                                                                                  • API String ID: 1885162932-1559421475
                                                                                  • Opcode ID: 8c9291d9f42d47a8899d4b03b9229061dbba9658711791ba9e587a7bafe15a5c
                                                                                  • Instruction ID: 6590c2d9b22bd5d94eb3815cd95563791dadc7ad2ec0a5107807e4eceb530072
                                                                                  • Opcode Fuzzy Hash: 8c9291d9f42d47a8899d4b03b9229061dbba9658711791ba9e587a7bafe15a5c
                                                                                  • Instruction Fuzzy Hash: F2227E30900659DFDB20DF68CC58BADBBB5BF45314F14928AE809A7391DB70AE85CF91
                                                                                  APIs
                                                                                    • Part of subcall function 00584450: GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W), ref: 00584547
                                                                                    • Part of subcall function 00584450: GetProcAddress.KERNEL32(00000000), ref: 0058454E
                                                                                    • Part of subcall function 00584450: PathFileExistsW.SHLWAPI(?), ref: 005845BC
                                                                                    • Part of subcall function 00584850: GetTempFileNameW.KERNEL32(?,00000000,00000000,?,5D2E80A5,?,00000004), ref: 005848C8
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,00000000), ref: 005B5CCD
                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000), ref: 005B5CF5
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,00000000), ref: 005B5D37
                                                                                  • CloseHandle.KERNEL32(?,?,00000000), ref: 005B5DAA
                                                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,?,00000000), ref: 005B5DDE
                                                                                    • Part of subcall function 00585350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0059E648,-00000010), ref: 00585373
                                                                                  • ShellExecuteExW.SHELL32(?), ref: 005B5E36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Handle$CloseExecuteShell$AddressCreateExistsFindHeapModuleNamePathProcProcessResourceTempWrite
                                                                                  • String ID: .bat$EXE$open$runas
                                                                                  • API String ID: 1017135135-1492471297
                                                                                  • Opcode ID: 79d09950081c7dab166e39bc0f966c545b444c0751eb190099fbf6565db13da0
                                                                                  • Instruction ID: e94f5f83cfbb64e17beb09e1ce0cc9997b7aebde4f81ec9d13f40f0d69cf25d2
                                                                                  • Opcode Fuzzy Hash: 79d09950081c7dab166e39bc0f966c545b444c0751eb190099fbf6565db13da0
                                                                                  • Instruction Fuzzy Hash: D5C19970900649DFDB04DF68C859BED7FA5BF48324F288259F815AB2D1DB74AE06CB90
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CloseHandle$Event$ObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 2663162059-0
                                                                                  • Opcode ID: d4c225ab23472d5bc28df31ab7120567b0e0e60c9e6a7796b384b5312be20016
                                                                                  • Instruction ID: 822efb0cb848dc1f49ba829425beea9964beab6d2edda3b6ea8ef4cd36889305
                                                                                  • Opcode Fuzzy Hash: d4c225ab23472d5bc28df31ab7120567b0e0e60c9e6a7796b384b5312be20016
                                                                                  • Instruction Fuzzy Hash: A4112AB8208A81CBDB345F76EC0CF577FB5BF14355B145A28E592D25A0EB30D8499B60
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00599C08
                                                                                  • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00599C12
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00599C24
                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00599C41
                                                                                  • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00599C4B
                                                                                  • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00599C58
                                                                                  • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00599C62
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastProcess$CloseCodeCreateExitHandleHeapObjectSingleWait
                                                                                  • String ID: "%s" %s$D
                                                                                  • API String ID: 3234789809-3971972636
                                                                                  • Opcode ID: 6f5f5208812e699e4684bbe50f2fb2254545633823c01f0cfedb2f2874a15094
                                                                                  • Instruction ID: 22392e6fd1da9545704c5aa19e8f542a2b825fd2d79a216263dcd2dfe9537a9f
                                                                                  • Opcode Fuzzy Hash: 6f5f5208812e699e4684bbe50f2fb2254545633823c01f0cfedb2f2874a15094
                                                                                  • Instruction Fuzzy Hash: A5517D71E046169FCF14DF68DC44AAEBBBAFF44710F20462EE921A7290D734AD45CBA0
                                                                                  APIs
                                                                                  • GetErrorInfo.OLEAUT32(00000000,00000000,5D2E80A5,00000000), ref: 0059517A
                                                                                  • SysFreeString.OLEAUT32(00000001), ref: 00595200
                                                                                  • SysFreeString.OLEAUT32(00000000), ref: 00595288
                                                                                  • SysStringLen.OLEAUT32(00000000), ref: 005952B7
                                                                                  • GetProcessHeap.KERNEL32(-000000FE,?), ref: 00595300
                                                                                  • HeapFree.KERNEL32(00000000,-000000FE,?), ref: 00595306
                                                                                  • GetProcessHeap.KERNEL32(-000000FE,00000000,?,00000000,00000000,00000000,5D2E80A5,00000000), ref: 00595333
                                                                                  • HeapFree.KERNEL32(00000000,-000000FE,00000000,?,00000000,00000000,00000000,5D2E80A5,00000000), ref: 00595339
                                                                                  • SysFreeString.OLEAUT32(00000000), ref: 00595351
                                                                                  • SetErrorInfo.OLEAUT32(00000000,00000000), ref: 00595407
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$HeapString$ErrorInfoProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1533966657-0
                                                                                  • Opcode ID: e683629c744243671d0eab327882f305b54ba28cfd0255bb33bc4560c02d9ab1
                                                                                  • Instruction ID: faf410244012638b5fd8a75dc4717c7e5c98b16ae032e13b791b67fd4de845a5
                                                                                  • Opcode Fuzzy Hash: e683629c744243671d0eab327882f305b54ba28cfd0255bb33bc4560c02d9ab1
                                                                                  • Instruction Fuzzy Hash: E9A17B70D0161ADBDF11DFA4C849BAEBFB8FF45314F144559E811AB281E7B89E04CBA1
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 005B0F3E
                                                                                  • DeleteObject.GDI32(?), ref: 005B0F96
                                                                                    • Part of subcall function 005B0910: IsWindowVisible.USER32 ref: 005B0926
                                                                                    • Part of subcall function 005B0910: SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 005B093C
                                                                                    • Part of subcall function 005B0910: GetWindowLongW.USER32(?,000000F0), ref: 005B0946
                                                                                    • Part of subcall function 005B0910: GetDlgItem.USER32(?,?), ref: 005B09B2
                                                                                    • Part of subcall function 005B0910: GetWindowRect.USER32(00000000,?), ref: 005B09CA
                                                                                    • Part of subcall function 005B0910: MapWindowPoints.USER32(00000000,?,00000002,00000002), ref: 005B09DB
                                                                                  • EndDialog.USER32(?,00000000), ref: 005B1016
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$DeleteDialogItemMessageObjectPointsRectSendVisible
                                                                                  • String ID:
                                                                                  • API String ID: 2368538989-0
                                                                                  • Opcode ID: 4e748f39aacb7fc76a54b8f4e0b3871d5b79f4e3c880dc74a7a0c34601da392c
                                                                                  • Instruction ID: 63fd5525eafb67ba9ebf7ca03a30baaee7279eb219b2b838196248a150e4fb27
                                                                                  • Opcode Fuzzy Hash: 4e748f39aacb7fc76a54b8f4e0b3871d5b79f4e3c880dc74a7a0c34601da392c
                                                                                  • Instruction Fuzzy Hash: 04410436304A1857D734AE39AC1EFFB7B98FB85771F00072AFD12C62D0CA61A85197A4
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?), ref: 005CD6DB
                                                                                  • SendMessageW.USER32(00000000,00000406,00000000,?), ref: 005CD6EF
                                                                                    • Part of subcall function 005D4D20: GetWindowLongW.USER32(?,000000F0), ref: 005D4D35
                                                                                    • Part of subcall function 005D4D20: GetParent.USER32(?), ref: 005D4D43
                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 005CD719
                                                                                    • Part of subcall function 005CCEB0: SetWindowLongW.USER32(?,000000FC,00000000), ref: 005CCEF3
                                                                                    • Part of subcall function 005CCEB0: GetWindowLongW.USER32(?,000000F0), ref: 005CCF08
                                                                                    • Part of subcall function 005CCEB0: SetWindowLongW.USER32(?,000000F0,00000000), ref: 005CCF20
                                                                                    • Part of subcall function 005CCEB0: CreateWindowExW.USER32(00000000,tooltips_class32,00000000,00000000,80000000,80000000,00000000,00000000,?,00000000,00000000), ref: 005CCF5D
                                                                                    • Part of subcall function 005CCEB0: IsWindow.USER32(00000000), ref: 005CCF67
                                                                                    • Part of subcall function 005CCEB0: SendMessageW.USER32(?,00000401,00000001,00000000), ref: 005CCF7D
                                                                                    • Part of subcall function 005CCA00: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 005CCA3E
                                                                                    • Part of subcall function 005CCA00: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005CCA4D
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(?,000000F0), ref: 005BBEE7
                                                                                    • Part of subcall function 005BBEA0: GetParent.USER32(00000000), ref: 005BBEFA
                                                                                    • Part of subcall function 005BBEA0: GetWindowRect.USER32(?,?), ref: 005BBF13
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 005BBF26
                                                                                    • Part of subcall function 005BBEA0: MonitorFromWindow.USER32(?,00000002), ref: 005BBF3E
                                                                                    • Part of subcall function 005BBEA0: GetMonitorInfoW.USER32(00000000,?), ref: 005BBF54
                                                                                  • SetWindowTextW.USER32(?,?), ref: 005CD7C5
                                                                                  • GetDlgItem.USER32(?,00000002), ref: 005CD80C
                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 005CD815
                                                                                  • GetSystemMenu.USER32(?,00000000), ref: 005CD81F
                                                                                  • ModifyMenuW.USER32(00000000,0000F060,00000001,00000000,00000000), ref: 005CD83D
                                                                                  • DestroyMenu.USER32(00000000), ref: 005CD84F
                                                                                  • SetEvent.KERNEL32(?,000000DA), ref: 005CD86A
                                                                                    • Part of subcall function 005AF8E0: GetFileVersionInfoSizeW.KERNELBASE(?,?,5D2E80A5,00000000,?,?,00000000,0061CCC5,000000FF,?,005BA745), ref: 005AF945
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$MessageSend$ItemMenu$InfoMonitorParent$CreateDestroyEnableEventFileFromModifyRectSizeSystemTextVersion
                                                                                  • String ID:
                                                                                  • API String ID: 3019886063-0
                                                                                  • Opcode ID: c4bb7be553ffde2fc0ae4cdfd81c110abf8f920c7c24bc367a4d811a1adab740
                                                                                  • Instruction ID: fce4c037e2cd54153e319e93696ea571ff23343c9bc230009a643491e4489a8f
                                                                                  • Opcode Fuzzy Hash: c4bb7be553ffde2fc0ae4cdfd81c110abf8f920c7c24bc367a4d811a1adab740
                                                                                  • Instruction Fuzzy Hash: 81518B71600605AFEB10EFA4CC49FA97BB6FF48310F104169F915EB2E1CB759902DB60
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,5D2E80A5), ref: 005CAA57
                                                                                    • Part of subcall function 005A6150: MultiByteToWideChar.KERNEL32(00000003,00000000,006338A1,000000FF,00000000,00000000,00000000,?,?,005B83BC,006338A1), ref: 005A6168
                                                                                    • Part of subcall function 005A6150: MultiByteToWideChar.KERNEL32(00000003,00000000,006338A1,000000FF,?,-00000001,?,005B83BC,006338A1), ref: 005A619A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ObjectSingleWait
                                                                                  • String ID: 2#vp1#v$*.*$.jar$.pack$0!X$@9c$p2#v3#v
                                                                                  • API String ID: 3339361032-2429828880
                                                                                  • Opcode ID: 800e95205ce757e20e6365f58de4bbc520610226a19a2471b959e426b78e1fa0
                                                                                  • Instruction ID: c8c3573b08637c24207a6cb7e5ce6749026d4d1038fe304104225e5fd290b492
                                                                                  • Opcode Fuzzy Hash: 800e95205ce757e20e6365f58de4bbc520610226a19a2471b959e426b78e1fa0
                                                                                  • Instruction Fuzzy Hash: 32615F70A0061A9FDB04DFA8C894BAEBFB5FF48324F15455DE421A7391DB34AD01CBA5
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 005CEC2D
                                                                                  • GetForegroundWindow.USER32 ref: 005CEC39
                                                                                  • SetLastError.KERNEL32(0000000E,?,?,?,5D2E80A5), ref: 005CEC80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveErrorForegroundLast
                                                                                  • String ID: \,e
                                                                                  • API String ID: 1822391280-2651779263
                                                                                  • Opcode ID: fee8f144c43794c31f8af33a3774cd737d97282e7b8a013ca50dbd25006c6ecd
                                                                                  • Instruction ID: 85791725a1ec70c061fc9cfa544420ba77bd732258de272042ed0dae2935fdc3
                                                                                  • Opcode Fuzzy Hash: fee8f144c43794c31f8af33a3774cd737d97282e7b8a013ca50dbd25006c6ecd
                                                                                  • Instruction Fuzzy Hash: 8441C472904609DFDB21DFA4D849FDDBFB9FF15310F14426AE811A7281DB74AA05CB90
                                                                                  APIs
                                                                                  • FlushFileBuffers.KERNEL32(?,?,00000000,?,000000FF,?,005D1597,?,?,?,00000000), ref: 005D1F65
                                                                                  • GetFileSize.KERNEL32(?,00000000,?,00000000,?,000000FF,?,005D1597), ref: 005D1F75
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFlushSize
                                                                                  • String ID: +Fa$?Fa$FTP Server$HTTP/1.0$Local Network Server$.
                                                                                  • API String ID: 3400284609-4284345852
                                                                                  • Opcode ID: 541da28679321b0ec6dba201a509a8ac232cb4adbe7df8e794c1bf86059ec047
                                                                                  • Instruction ID: 2ab5aa828952e19584016802a5326effa37f2b6d95e8464c978b3094f7d9cf4e
                                                                                  • Opcode Fuzzy Hash: 541da28679321b0ec6dba201a509a8ac232cb4adbe7df8e794c1bf86059ec047
                                                                                  • Instruction Fuzzy Hash: 96419F71A00649DFDB10DF68C844BAEBBB9FF08320F14426AE921E7391D7759E01CBA0
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 005F4316
                                                                                  • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 005F4324
                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 005F4335
                                                                                  • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 005F4346
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                  • API String ID: 667068680-1247241052
                                                                                  • Opcode ID: 7783bfa3b6088073cace87d2dfd6ce6192f5e4f80c5ef78fc106c4c2a842d791
                                                                                  • Instruction ID: b50c659d747bd2a7f31f9f17b0e2723a77550ad001043685715d2daba3d0773e
                                                                                  • Opcode Fuzzy Hash: 7783bfa3b6088073cace87d2dfd6ce6192f5e4f80c5ef78fc106c4c2a842d791
                                                                                  • Instruction Fuzzy Hash: EBE0E6B5585620EB97105FB47D4DC473AE7EB29B523015461F505D2250DBB404468F91
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32(005953F4,?,?,000000FF), ref: 00594D7D
                                                                                  • HeapFree.KERNEL32(00000000,005953F4,?,?,000000FF), ref: 00594D83
                                                                                  • GetProcessHeap.KERNEL32(005952F5,000000FF,?,000000FF), ref: 00594DBD
                                                                                  • HeapFree.KERNEL32(00000000,005952F5,000000FF,?,000000FF), ref: 00594DC3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$FreeProcess
                                                                                  • String ID: $@c$4@c$D@c$d@c$?c
                                                                                  • API String ID: 3859560861-3995529386
                                                                                  • Opcode ID: b195769b4b5773e22697f7b79d0c9cedc0d2f7a6f82a1d61ef68b540a8c0fff5
                                                                                  • Instruction ID: b6011aab6c699ada9373096a2a66c8cff7a6720a6775341bb4acf7ccefb71cec
                                                                                  • Opcode Fuzzy Hash: b195769b4b5773e22697f7b79d0c9cedc0d2f7a6f82a1d61ef68b540a8c0fff5
                                                                                  • Instruction Fuzzy Hash: 3B81BFB6A003068FEF14CF58C844BAEBBA5FF90324F154669E915AB380D779ED058F91
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,00000427), ref: 005D58D6
                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 005D58E6
                                                                                  • EndDialog.USER32(?,00000001), ref: 005D58FA
                                                                                    • Part of subcall function 005D5C00: SetWindowTextW.USER32(?,00623AD5), ref: 005D5C9E
                                                                                    • Part of subcall function 005D5C00: GetDlgItem.USER32(?,0000042B), ref: 005D5D02
                                                                                    • Part of subcall function 005D5C00: SetWindowTextW.USER32(00000000,00000000), ref: 005D5D0D
                                                                                    • Part of subcall function 005D5C00: GetDlgItem.USER32(?,00000001), ref: 005D5D17
                                                                                    • Part of subcall function 005D5C00: EnableWindow.USER32(00000000,00000000), ref: 005D5D20
                                                                                  • EndDialog.USER32(?,00000002), ref: 005D5925
                                                                                  • GetDlgItem.USER32(?,00000001), ref: 005D5974
                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 005D5986
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemWindow$DialogEnableText$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3408327222-0
                                                                                  • Opcode ID: 3969f2cc1df9424f5a9959604bbf5a954348af5b3458a905d1f8c1b7f3f2004c
                                                                                  • Instruction ID: f16cc7748a3cd889fec8929eebd0ffe3ba462acfc1d2e3eb06aa9b2a20b56d7c
                                                                                  • Opcode Fuzzy Hash: 3969f2cc1df9424f5a9959604bbf5a954348af5b3458a905d1f8c1b7f3f2004c
                                                                                  • Instruction Fuzzy Hash: 8F51E371A006059FDB34EF68D885B6A7BA5FB94321F40812BF90187390EB71DCA5DBE1
                                                                                  APIs
                                                                                  • IsWindowVisible.USER32 ref: 005B0926
                                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 005B093C
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005B0946
                                                                                  • GetDlgItem.USER32(?,?), ref: 005B09B2
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 005B09CA
                                                                                  • MapWindowPoints.USER32(00000000,?,00000002,00000002), ref: 005B09DB
                                                                                  • SetWindowPos.USER32(00000014,00000000,?,00000002,00000002,?,00000014,?,00000002,00000002,?,?,?,000000F0,?,00000000), ref: 005B0A57
                                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 005B0A85
                                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 005B0A96
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSend$ItemLongPointsRectRedrawVisible
                                                                                  • String ID:
                                                                                  • API String ID: 3196996609-0
                                                                                  • Opcode ID: c7321682b049781b70c3ef162dc4d886528930e7e542f49f5f12225f5cce50a6
                                                                                  • Instruction ID: 3e49b947f7d28060d80a6dfc7010a5aaa8688fb9db7fee1828908fac4b82a8c0
                                                                                  • Opcode Fuzzy Hash: c7321682b049781b70c3ef162dc4d886528930e7e542f49f5f12225f5cce50a6
                                                                                  • Instruction Fuzzy Hash: 09515931208701DFE724CF28C889B6BBBE2BF84744F145A1CF9959B2A5D771E845CB51
                                                                                  APIs
                                                                                  • CoInitializeEx.OLE32(00000000,00000000,5D2E80A5), ref: 005964FC
                                                                                  • GetProcessHeap.KERNEL32(?,00000000), ref: 00596613
                                                                                  • HeapFree.KERNEL32(00000000,?,00000000), ref: 00596619
                                                                                  • GetProcessHeap.KERNEL32(?,00000000), ref: 005966AA
                                                                                  • HeapFree.KERNEL32(00000000,?,00000000), ref: 005966B0
                                                                                  • CoUninitialize.OLE32 ref: 0059688A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$FreeProcess$InitializeUninitialize
                                                                                  • String ID: 4?c
                                                                                  • API String ID: 4239879612-1346801280
                                                                                  • Opcode ID: ed77a124cde4f37f88de446e4836375642632037013f621906de6ecdd53a260b
                                                                                  • Instruction ID: f208475421919473e3727ce2f339cb5a143f208cf33b73a5a426ecbf5050a0fc
                                                                                  • Opcode Fuzzy Hash: ed77a124cde4f37f88de446e4836375642632037013f621906de6ecdd53a260b
                                                                                  • Instruction Fuzzy Hash: 5FE17870D00259CFDF14DFA8C948BAEBFB9BF44304F244199E409AB291DB34AA49DF61
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000080,00000001,Close,50000001,?,00000128,00000025,00000032,0000000E,00000082,000001F5,?,50000000,?,00000026), ref: 005B0DC5
                                                                                  • DialogBoxIndirectParamW.USER32(00000000,00000000,?,005B0F30,00000000), ref: 005B0E14
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: DialogHandleIndirectModuleParam
                                                                                  • String ID: Close$Copy$Details >>$Send Error Report$d\c
                                                                                  • API String ID: 279259766-2268044251
                                                                                  • Opcode ID: 42739dd0f35a406c4872e2d627354cd7e695b7bbcde5b7c6bcb800028c111282
                                                                                  • Instruction ID: c92e35fb5d39d92949ebd48717463585e6c14019b3a82b0168187b602866764e
                                                                                  • Opcode Fuzzy Hash: 42739dd0f35a406c4872e2d627354cd7e695b7bbcde5b7c6bcb800028c111282
                                                                                  • Instruction Fuzzy Hash: 73D18C70A00619AFDB14DFA4CC56BEEBBB5BF48714F104619F511BB2C0E7B0AA01CB94
                                                                                  APIs
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 005F6307
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 005F630F
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 005F6398
                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 005F63C3
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 005F6418
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                  • String ID: P`_$csm
                                                                                  • API String ID: 1170836740-1013232017
                                                                                  • Opcode ID: 4a5d090e6d0ff948cd08d75c5638c2efdeb399e0437d67daaba1b48078f6ac32
                                                                                  • Instruction ID: 2509d9cd1d3cf8aebf94e01f0e38a8b0cc9ddfc5843d76c02620e63a20415ad4
                                                                                  • Opcode Fuzzy Hash: 4a5d090e6d0ff948cd08d75c5638c2efdeb399e0437d67daaba1b48078f6ac32
                                                                                  • Instruction Fuzzy Hash: E141E638A0020DEBCF10DF68C884AAEBFB6BF44314F148555EA149B392D739E955CF91
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(Advapi32.dll,5D2E80A5,?,00000000,?,?,Function_00095000,000000FF,?,005A173D,?), ref: 005A182A
                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 005A183A
                                                                                  • GetModuleHandleW.KERNEL32(Advapi32.dll,5D2E80A5,?,00000000,?,?,Function_00095000,000000FF,?,005A173D,?), ref: 005A18A6
                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 005A18B6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: Advapi32.dll$RegDeleteKeyExW$RegDeleteKeyTransactedW
                                                                                  • API String ID: 1646373207-1053001802
                                                                                  • Opcode ID: 01d205934a5827654c58af6a174dedc5aef6b8bf1695943e374f22cc3e1c78a0
                                                                                  • Instruction ID: a0a0dc0069d5bc443497edf77263063e04852d12e101dc6eb20d2f5a66affc94
                                                                                  • Opcode Fuzzy Hash: 01d205934a5827654c58af6a174dedc5aef6b8bf1695943e374f22cc3e1c78a0
                                                                                  • Instruction Fuzzy Hash: 4831E376A08A05EFDB20CF55EC05F5DFFAAFB45B21F10412AE90593390CB76A850DB98
                                                                                  APIs
                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,80000002,80000002,00650A68), ref: 005AFB50
                                                                                  • LoadLibraryW.KERNEL32(Shell32.dll,?,80000002,80000002,00650A68), ref: 005AFB63
                                                                                  • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 005AFB73
                                                                                  • SHGetPathFromIDListW.SHELL32(?,00000000), ref: 005AFC02
                                                                                  • SHGetMalloc.SHELL32(?), ref: 005AFC4A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFolderFromLibraryListLoadLocationMallocPathProcSpecial
                                                                                  • String ID: SHGetSpecialFolderPathW$Shell32.dll
                                                                                  • API String ID: 2352187698-2988203397
                                                                                  • Opcode ID: 686d843343788f8ba0f3c2c739e0acd4968ee1f407b09cf756a8d700d2767735
                                                                                  • Instruction ID: d4627f877bfcd2f716b9f924e272d5e7115b24e8719bdda06dfd8b3de9560b03
                                                                                  • Opcode Fuzzy Hash: 686d843343788f8ba0f3c2c739e0acd4968ee1f407b09cf756a8d700d2767735
                                                                                  • Instruction Fuzzy Hash: 103128716047159BDB209F54DC15F6BBBF6BF84710F08842CE845871D4EB75988687A2
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 005CDC7B
                                                                                  • SetLastError.KERNEL32(0000000E), ref: 005CDC98
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 005CDCC7
                                                                                  • EnterCriticalSection.KERNEL32(00652C5C), ref: 005CDCE7
                                                                                  • LeaveCriticalSection.KERNEL32(00652C5C), ref: 005CDD0B
                                                                                  • DialogBoxParamW.USER32(000000D8,00000000,Function_0003BD70,00000000), ref: 005CDD28
                                                                                    • Part of subcall function 005F1F2A: GetProcessHeap.KERNEL32(00000008,00000008,?,005BA67E), ref: 005F1F2F
                                                                                    • Part of subcall function 005F1F2A: HeapAlloc.KERNEL32(00000000), ref: 005F1F36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalHeapSection$ActiveAllocCurrentDialogEnterErrorLastLeaveParamProcessThreadWindow
                                                                                  • String ID: \,e
                                                                                  • API String ID: 828238446-2651779263
                                                                                  • Opcode ID: 3bd22507b967ad601f39fc5490182c72718fdfd70018a5e3ba82a36f0dfa0391
                                                                                  • Instruction ID: 7a0b6b9ab7b11a1e06c6ef54bfbe65cb9f84ad49d2d222da8b19a1bff80517a8
                                                                                  • Opcode Fuzzy Hash: 3bd22507b967ad601f39fc5490182c72718fdfd70018a5e3ba82a36f0dfa0391
                                                                                  • Instruction Fuzzy Hash: 7131E136A04745AFC720CFA8EC09B9DBBB5FB45715F10466EE915EB780C7B16801CBA1
                                                                                  APIs
                                                                                  • SetWindowLongW.USER32(?,000000FC,00000000), ref: 005CCEF3
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005CCF08
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005CCF20
                                                                                  • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,00000000,80000000,80000000,00000000,00000000,?,00000000,00000000), ref: 005CCF5D
                                                                                  • IsWindow.USER32(00000000), ref: 005CCF67
                                                                                  • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 005CCF7D
                                                                                    • Part of subcall function 005F1F2A: GetProcessHeap.KERNEL32(00000008,00000008,?,005BA67E), ref: 005F1F2F
                                                                                    • Part of subcall function 005F1F2A: HeapAlloc.KERNEL32(00000000), ref: 005F1F36
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$Heap$AllocCreateMessageProcessSend
                                                                                  • String ID: tooltips_class32
                                                                                  • API String ID: 1584627587-1918224756
                                                                                  • Opcode ID: e0420c31fddb5e24f9ad0899e8b5c45aafaf26a8dd6a703a207417e259a5db5e
                                                                                  • Instruction ID: 27aa4ea697b573d4da5a1c01a56c1d6b60de1fc27c1709baad8e188bc229007f
                                                                                  • Opcode Fuzzy Hash: e0420c31fddb5e24f9ad0899e8b5c45aafaf26a8dd6a703a207417e259a5db5e
                                                                                  • Instruction Fuzzy Hash: 8021A375204602BFDB109F64DC49F26BFAAFB49721F105319F519D36E0DB70A851CBA4
                                                                                  APIs
                                                                                  • LocalFree.KERNEL32(?,?,?), ref: 005A50A2
                                                                                  • LocalFree.KERNEL32(?,?,?), ref: 005A50B6
                                                                                  • GetLastError.KERNEL32 ref: 005A50F8
                                                                                  • LocalAlloc.KERNEL32(00000040,00000014), ref: 005A5138
                                                                                  • GetLastError.KERNEL32 ref: 005A5152
                                                                                  • LocalFree.KERNEL32(?), ref: 005A5163
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Local$Free$ErrorLast$AllocAllocateHeap
                                                                                  • String ID: sFa$}Fa
                                                                                  • API String ID: 1027944315-3528513635
                                                                                  • Opcode ID: cd295186d693bf61c6f205831eee928c0be58aa57f237278f22fbe85ae86317a
                                                                                  • Instruction ID: f8becf4cb6f8b8d534912dcf7800bc0535efe87003f9bc460992f99e4a986442
                                                                                  • Opcode Fuzzy Hash: cd295186d693bf61c6f205831eee928c0be58aa57f237278f22fbe85ae86317a
                                                                                  • Instruction Fuzzy Hash: 5E31F470604B02AFD7309F29EC48B6BBBE9BB45705F00892DE986C2690E774D549CBA1
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,005F1F72,00000000), ref: 005F1DEC
                                                                                  • HeapAlloc.KERNEL32(00000000,?,005F1F72,00000000), ref: 005F1DF3
                                                                                    • Part of subcall function 005F1EBE: IsProcessorFeaturePresent.KERNEL32(0000000C,005F1DDA,00000000,?,005F1F72,00000000), ref: 005F1EC0
                                                                                  • InterlockedPopEntrySList.KERNEL32(00000000,00000000,?,005F1F72,00000000), ref: 005F1E03
                                                                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,005F1F72,00000000), ref: 005F1E2A
                                                                                  • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,005F1F72,00000000), ref: 005F1E3E
                                                                                  • InterlockedPopEntrySList.KERNEL32(00000000,?,005F1F72,00000000), ref: 005F1E51
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,005F1F72,00000000), ref: 005F1E64
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
                                                                                  • String ID:
                                                                                  • API String ID: 2460949444-0
                                                                                  • Opcode ID: 361adf408d7a000a8b9092989a4f833499b27e918decbab6a2a0b67c11647ad4
                                                                                  • Instruction ID: f8174b59e0aa71b746dfbaf8ffb511f8fc3a9bf250461e0ecbe158e0a2524ec5
                                                                                  • Opcode Fuzzy Hash: 361adf408d7a000a8b9092989a4f833499b27e918decbab6a2a0b67c11647ad4
                                                                                  • Instruction Fuzzy Hash: 1011E271606E1AEBE7311B64AC48F7B3E6EBB45781F105530FF01DA150DA28CC0246B8
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32 ref: 005D027A
                                                                                  • ResetEvent.KERNEL32(?,?,?,?,?,?,?,POST,?,?,-00000010), ref: 005D0475
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005D0495
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005D04A0
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                    • Part of subcall function 005D1750: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,5D2E80A5,?,?,00000000), ref: 005D178F
                                                                                    • Part of subcall function 005D1750: GetLastError.KERNEL32 ref: 005D17B0
                                                                                    • Part of subcall function 005D1750: CloseHandle.KERNEL32(?), ref: 005D1A94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastObjectSingleWait$CloseCreateEventFileHandleHeapProcessReset
                                                                                  • String ID: .part$POST
                                                                                  • API String ID: 2995559500-3433193937
                                                                                  • Opcode ID: 9233b5e89f359b804edd80be26071f52c7f356a38ab6953fe15da0bf13af6d59
                                                                                  • Instruction ID: 796a99200f543d6c26d7d3a42ceaba87fafd3da6a6f95449a822cbeaaa808266
                                                                                  • Opcode Fuzzy Hash: 9233b5e89f359b804edd80be26071f52c7f356a38ab6953fe15da0bf13af6d59
                                                                                  • Instruction Fuzzy Hash: 30128831A00649EFDB10DFA8C848BAEBBB5FF48314F14525AF815A7391DB74AA05CF91
                                                                                  APIs
                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,FF005A32,FF005A22,FF005A4E,FF005A3A,?,?), ref: 005C909C
                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,FF005A32,00000010,FF005A4E), ref: 005C9116
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 005C91F0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue$Close
                                                                                  • String ID: 2#vp1#v$0!X$p2#v3#v
                                                                                  • API String ID: 1979452859-3019436278
                                                                                  • Opcode ID: b29e092f608a58aa1c91fbf00b648bf76f7be7e33f6db7d31a49010614ec0b20
                                                                                  • Instruction ID: 3782c6cfaeb572905de177998038d9f2a93a917eeefd0c69b766169bda779339
                                                                                  • Opcode Fuzzy Hash: b29e092f608a58aa1c91fbf00b648bf76f7be7e33f6db7d31a49010614ec0b20
                                                                                  • Instruction Fuzzy Hash: 4CF18C759016199FDB20DFA8CC8CBADBBB5BF48320F1442D9E419A7291DB34AE85CF50
                                                                                  APIs
                                                                                    • Part of subcall function 005A1950: CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A1986
                                                                                    • Part of subcall function 005A1950: CharNextW.USER32(00000000,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A19AB
                                                                                    • Part of subcall function 005A1950: CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A19BF
                                                                                    • Part of subcall function 005A1950: CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A19CB
                                                                                  • lstrcmpiW.KERNEL32(?,006348FC,?,5D2E80A5,00000000,00000000,?), ref: 005A10B1
                                                                                  • lstrcmpiW.KERNEL32(?,006337C4), ref: 005A10CC
                                                                                  • VarUI4FromStr.OLEAUT32(?,00000000,00000000,?), ref: 005A1346
                                                                                  • CharNextW.USER32(?,?), ref: 005A1439
                                                                                  • CharNextW.USER32(00000000), ref: 005A1453
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharNext$lstrcmpi$From
                                                                                  • String ID:
                                                                                  • API String ID: 298784196-0
                                                                                  • Opcode ID: 7c7099e6290e463d34b3b48164a25282e20609779a76c25aff2169e60cee51e7
                                                                                  • Instruction ID: a9aad1dfdd140332b6b3706481fa533413df41a8d33f4ec977879640abfee022
                                                                                  • Opcode Fuzzy Hash: 7c7099e6290e463d34b3b48164a25282e20609779a76c25aff2169e60cee51e7
                                                                                  • Instruction Fuzzy Hash: F3D1E074900609DFCF24CF68C889BEE7BB4FF4A300F144229E955AB291EB749A45CB58
                                                                                  APIs
                                                                                    • Part of subcall function 005A6400: GetFileAttributesW.KERNEL32(?,?,?,00632E60,00000001,5D2E80A5,?,?,00000000), ref: 005A6681
                                                                                    • Part of subcall function 005A6400: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 005A6692
                                                                                    • Part of subcall function 005A6400: FindNextFileW.KERNEL32(-00000001,?,?,?,00000000), ref: 005A6706
                                                                                  • GetFileAttributesW.KERNEL32(?,?,?,00632E60,00000001,5D2E80A5,?,?,00000000), ref: 005A66A5
                                                                                  • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 005A66B6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Attributes$FindNext
                                                                                  • String ID: p2#v3#v
                                                                                  • API String ID: 3019667586-1446698346
                                                                                  • Opcode ID: 071778cbe4a853bb8265d499bbc6c7a287165eb246221778597bb3735de3b600
                                                                                  • Instruction ID: bcbf094cf373cadae19edee0d0417cb40336ae6df322ae288a53fe5d36f45394
                                                                                  • Opcode Fuzzy Hash: 071778cbe4a853bb8265d499bbc6c7a287165eb246221778597bb3735de3b600
                                                                                  • Instruction Fuzzy Hash: 58A1E031A006099FDB20EF68CD59BAEBBB9FF45310F184629E915A72D1DB74AE04CB50
                                                                                  APIs
                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 005F86B0
                                                                                  • ___TypeMatch.LIBVCRUNTIME ref: 005F87BE
                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 005F892B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallMatchTypeUnexpectedtype_info::operator==
                                                                                  • String ID: csm$csm$csm
                                                                                  • API String ID: 1206542248-393685449
                                                                                  • Opcode ID: b2ea39934ad8a367a3563f3e197e05744af9ef339543b7504077e680095936e0
                                                                                  • Instruction ID: 7b3efdb28a8eb68ae0c50dc989240dd9644f93dbe5a05f968b2e2994018c2702
                                                                                  • Opcode Fuzzy Hash: b2ea39934ad8a367a3563f3e197e05744af9ef339543b7504077e680095936e0
                                                                                  • Instruction Fuzzy Hash: 32B1677180020EEFCF14EFA4C8859BEBFB5BF54310B54485AEA016B216DB79DA51CF91
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapProcess
                                                                                  • String ID: ?Fa
                                                                                  • API String ID: 54951025-1289798386
                                                                                  • Opcode ID: 23aab4fa4c6f6c7e36e68bc1637cc4655dfba031e2fb37d37d12d6bc1543417b
                                                                                  • Instruction ID: c15cd7bf6d3e9b5dad136627717f28a271b896607149337e646e4cab2e2d781c
                                                                                  • Opcode Fuzzy Hash: 23aab4fa4c6f6c7e36e68bc1637cc4655dfba031e2fb37d37d12d6bc1543417b
                                                                                  • Instruction Fuzzy Hash: 5E918D31A00649DFDB21DFA8C888B9DBFB6FF48324F14815AE915A7391CBB49D01CB91
                                                                                  APIs
                                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 005CE17F
                                                                                  • GetWindowLongW.USER32(?,000000FC), ref: 005CE18E
                                                                                  • CallWindowProcW.USER32(?,?,00000082,?,?), ref: 005CE1A9
                                                                                  • GetWindowLongW.USER32(?,000000FC), ref: 005CE1C3
                                                                                  • SetWindowLongW.USER32(?,000000FC,?), ref: 005CE1D5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$CallProc
                                                                                  • String ID: $
                                                                                  • API String ID: 513923721-3993045852
                                                                                  • Opcode ID: e10010d15d706efd095281a6ff605a4e91fa84e0568a6ffec8b94df494f614e4
                                                                                  • Instruction ID: 88e37f7b5a22988622e59593fef1b895c93db4028af5c6cbb6b0c965f876d74b
                                                                                  • Opcode Fuzzy Hash: e10010d15d706efd095281a6ff605a4e91fa84e0568a6ffec8b94df494f614e4
                                                                                  • Instruction Fuzzy Hash: 244146B1608B02AFC710DF59C885A2AFBF5FB88320F144A1DF99583660C772A965DB91
                                                                                  APIs
                                                                                  • EnterCriticalSection.KERNEL32(00652C5C,5D2E80A5), ref: 005BBDAD
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 005BBDC1
                                                                                  • LeaveCriticalSection.KERNEL32(00652C5C), ref: 005BBDFF
                                                                                  • SetWindowLongW.USER32(?,00000004,00000000), ref: 005BBE65
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CurrentEnterLeaveLongThreadWindow
                                                                                  • String ID: \,e$\,e
                                                                                  • API String ID: 3550545212-381317129
                                                                                  • Opcode ID: 9098f24faa1898981eb3808e5849930e317d8353cac64193b25bca6eeea71aaa
                                                                                  • Instruction ID: f9a2ec44a343ca4fbdf479314dd31563d82b00387efccc4eb160379bea3506cc
                                                                                  • Opcode Fuzzy Hash: 9098f24faa1898981eb3808e5849930e317d8353cac64193b25bca6eeea71aaa
                                                                                  • Instruction Fuzzy Hash: DB31D232A04615DFDB20CF25DC09BAABFBAFF45760F04462AE81593350DBB4A800DBA0
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(Shlwapi.dll,?,00000000,FF005C1A,?), ref: 005AF6FF
                                                                                  • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 005AF715
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 005AF758
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 005AF774
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Free$AddressLoadProc
                                                                                  • String ID: DllGetVersion$Shlwapi.dll
                                                                                  • API String ID: 1386263645-2240825258
                                                                                  • Opcode ID: 87830b549792e3e02e32234661a652ed5db8da8533a6abe8e72bf4e3e41a3162
                                                                                  • Instruction ID: 2be6e224aeffee14c1d41cf86af4cce7e62afecd6149bce32b606942bef9dacf
                                                                                  • Opcode Fuzzy Hash: 87830b549792e3e02e32234661a652ed5db8da8533a6abe8e72bf4e3e41a3162
                                                                                  • Instruction Fuzzy Hash: 82218E796043058BD320DF69E88592BFBE5FFDD311F40192DF459C3250EA35948A8BA2
                                                                                  APIs
                                                                                  • ResetEvent.KERNEL32(?), ref: 005ED30D
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 005ED31D
                                                                                  • GetLastError.KERNEL32 ref: 005ED32D
                                                                                  • CloseHandle.KERNEL32(?), ref: 005ED357
                                                                                  • GetLastError.KERNEL32 ref: 005ED361
                                                                                  • CreateSemaphoreW.KERNEL32(00000000,00000000,00000003,00000000), ref: 005ED386
                                                                                  • GetLastError.KERNEL32 ref: 005ED393
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CreateEvent$CloseHandleResetSemaphore
                                                                                  • String ID:
                                                                                  • API String ID: 3310109588-0
                                                                                  • Opcode ID: fcc581158523d4c71af6cfc01019fc24516deb4cd0fb996ece5833175dc0e2d5
                                                                                  • Instruction ID: 48e8273b1acd2874c9e67e41c27b3f97f95db6faa826c8a6d904c90353264b7c
                                                                                  • Opcode Fuzzy Hash: fcc581158523d4c71af6cfc01019fc24516deb4cd0fb996ece5833175dc0e2d5
                                                                                  • Instruction Fuzzy Hash: 6B216FB0304B42DBEB385F26DC59B277BF9BF48745F105829E986D6290E770E8048B72
                                                                                  APIs
                                                                                  • ResetEvent.KERNEL32(?,?,?,00000000,005D2C42,?,?,?,?,?,00000003,00000000,5D2E80A5,?,?), ref: 005D3A33
                                                                                  • GetLastError.KERNEL32(?,?,?,00000000,005D2C42,?,?,?,?,?,00000003,00000000,5D2E80A5,?,?), ref: 005D3A60
                                                                                  • WaitForSingleObject.KERNEL32(?,0000000A,?,?,?,00000000,005D2C42,?,?,?,?,?,00000003,00000000,5D2E80A5), ref: 005D3A9A
                                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,005D2C42,?,?,?,?,?,00000003,00000000,5D2E80A5,?,?), ref: 005D3AC3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Event$ErrorLastObjectResetSingleWait
                                                                                  • String ID: !Fa$B,]
                                                                                  • API String ID: 708712559-4182801914
                                                                                  • Opcode ID: db67445cd3edcec5fe6f78e38a4cbe6806d592cf41e13cffd5cf6660e0bf42e8
                                                                                  • Instruction ID: 891aa2a491e56ee85fd7a072d77fd4e232b2dbf915de7744ba4c865f6a0e6153
                                                                                  • Opcode Fuzzy Hash: db67445cd3edcec5fe6f78e38a4cbe6806d592cf41e13cffd5cf6660e0bf42e8
                                                                                  • Instruction Fuzzy Hash: 5A1181363057409FDB309B59E888B1A7F96FB95322F14982FE08386661C730E999D762
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,005F16C3,005F1622,005F1944), ref: 005F165F
                                                                                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 005F1675
                                                                                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 005F168A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                  • API String ID: 667068680-1718035505
                                                                                  • Opcode ID: c9af5cf4c89056954ab3f70f77e658e1b0569e5427e84628acc34bd4c73297a9
                                                                                  • Instruction ID: b5edde80a4d28146309e550f6d209adb9aa5488d0728288a136b543e97375375
                                                                                  • Opcode Fuzzy Hash: c9af5cf4c89056954ab3f70f77e658e1b0569e5427e84628acc34bd4c73297a9
                                                                                  • Instruction Fuzzy Hash: 1FF022B1300E27CB5B309F706E989762EDEBA06B043081639EB05C7A40D71CCC428B98
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 005C43A3
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 005C43AE
                                                                                  • GetDlgItem.USER32(?,0000040B), ref: 005C43BC
                                                                                  • SendMessageW.USER32(00000000,00000410,00000002,00000000), ref: 005C43CE
                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 005C43D7
                                                                                  • Sleep.KERNEL32(000000C8), ref: 005C43E2
                                                                                  • ShowWindow.USER32(00000000,00000001), ref: 005C43EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemShow$MessageSendSleepText
                                                                                  • String ID:
                                                                                  • API String ID: 106862907-0
                                                                                  • Opcode ID: 0cf416f42c25889029835f5d2512087db1ddb37b2bb460428e5a1fdd86aefc98
                                                                                  • Instruction ID: b114eb882a0d8bbce12983dde7d797769446aab0426674fb07a5a556c7a5bdca
                                                                                  • Opcode Fuzzy Hash: 0cf416f42c25889029835f5d2512087db1ddb37b2bb460428e5a1fdd86aefc98
                                                                                  • Instruction Fuzzy Hash: B5012C31645B10BFDB219B60DC0AF9A7BA6BF48B11F045414FB01A71A0C7B05862DF59
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8586c5d71feaed562c3cb2398b7223cb6986c6d880ff178101deb1bcaa2171fe
                                                                                  • Instruction ID: 3c731893c5215d8f21962900dbc8ae75a2518bd52f4994b8ece95b2dd1b4ee5b
                                                                                  • Opcode Fuzzy Hash: 8586c5d71feaed562c3cb2398b7223cb6986c6d880ff178101deb1bcaa2171fe
                                                                                  • Instruction Fuzzy Hash: 1BB16772D4435A9FDB19CF24C881BEFBBA2EF59300F144095E945AB3C2D674AD01CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e1a7b020f870fc2e676513587cb6b10cd0c5e01f8ab6612b4606e273ec53c836
                                                                                  • Instruction ID: 21d01d27ae0b6843ef3d793787c1352d52ba3a045454d3fdcdf1ff64a154f69e
                                                                                  • Opcode Fuzzy Hash: e1a7b020f870fc2e676513587cb6b10cd0c5e01f8ab6612b4606e273ec53c836
                                                                                  • Instruction Fuzzy Hash: A2B1D2B0A0424AAFDB11DFA9C8A1BFD7BB3BF45304F184159E500A7392D7749DA2CB61
                                                                                  APIs
                                                                                    • Part of subcall function 005A7C78: ShellExecuteExW.SHELL32(0000003C), ref: 005A7D54
                                                                                    • Part of subcall function 005A7C78: GetLastError.KERNEL32 ref: 005A7D65
                                                                                  • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 005B7BA3
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 005B7BD5
                                                                                  • CloseHandle.KERNEL32(?), ref: 005B7C8A
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 005B7CD1
                                                                                  • CloseHandle.KERNEL32(?,?,00632ECC), ref: 005B7D36
                                                                                  • CloseHandle.KERNEL32(?), ref: 005B7D6C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFileHandle$CreateErrorExecuteLastReadShellWrite
                                                                                  • String ID:
                                                                                  • API String ID: 521638843-0
                                                                                  • Opcode ID: c39ae0e57bf1f2c8fd5c8aac49451e8e142b6f5757e3609979e7def63bceae52
                                                                                  • Instruction ID: 112dcbac37b09fd5fdb98c6b5511907be6293f5422d644bbdcd42d611bd1bd81
                                                                                  • Opcode Fuzzy Hash: c39ae0e57bf1f2c8fd5c8aac49451e8e142b6f5757e3609979e7def63bceae52
                                                                                  • Instruction Fuzzy Hash: 65915970A042099FCB14DFA8C895BEDBFB5BF88310F244169E815AB291DB74AD45CBA4
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00588D4A
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00588D6C
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00588D94
                                                                                  • __Getctype.LIBCPMT ref: 00588E75
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00588ED7
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00588F0B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                                  • String ID:
                                                                                  • API String ID: 1102183713-0
                                                                                  • Opcode ID: 6bf75f34d687406032ca8b1ae44c9608131995e9ed10da1633e2881d1e4a10a0
                                                                                  • Instruction ID: 430076d7def1aee1a3afa5864dc463fdf7ee3bf3a859e4febe3572234dffbc34
                                                                                  • Opcode Fuzzy Hash: 6bf75f34d687406032ca8b1ae44c9608131995e9ed10da1633e2881d1e4a10a0
                                                                                  • Instruction Fuzzy Hash: B861AEB0D0064ADFDB00DF68C9457A9FBF5FF65310F148259D805AB391DB74AA84CB91
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0058D0ED
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0058D10F
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0058D137
                                                                                  • __Getcoll.LIBCPMT ref: 0058D201
                                                                                  • std::_Facet_Register.LIBCPMT ref: 0058D246
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0058D287
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcollRegister
                                                                                  • String ID:
                                                                                  • API String ID: 1184649410-0
                                                                                  • Opcode ID: 86b902ffc3ba1271d5f4521804ddf38cf1cc57fd70926d5acbb3b6b3cbce1cd4
                                                                                  • Instruction ID: 3f1ccc8b3cf40bb6123c96ac90cd846ccdd42a580f693be951189afaf39efe92
                                                                                  • Opcode Fuzzy Hash: 86b902ffc3ba1271d5f4521804ddf38cf1cc57fd70926d5acbb3b6b3cbce1cd4
                                                                                  • Instruction Fuzzy Hash: EF51ABB0D00209EFDB01EF94D888BADBFF5FF84310F244159E805AB291DB74AA45CBA1
                                                                                  APIs
                                                                                  • CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A1986
                                                                                  • CharNextW.USER32(00000000,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A19AB
                                                                                  • CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A19BF
                                                                                  • CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A19CB
                                                                                  • CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A1A31
                                                                                  • CharNextW.USER32(?,?,00000000,0000007B,?,?,005A262C,00000000,?,00000000,?,00000000,00000000,00000000,005A28BE,?), ref: 005A1A5E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharNext
                                                                                  • String ID:
                                                                                  • API String ID: 3213498283-0
                                                                                  • Opcode ID: 60295d0b5c23068d6169e21cebcc9af9091be850df41e085d1d651af5e78e4e8
                                                                                  • Instruction ID: 37fea6247b2401176bb499c675993658fcfce2fd23567ba666733de4668f48e4
                                                                                  • Opcode Fuzzy Hash: 60295d0b5c23068d6169e21cebcc9af9091be850df41e085d1d651af5e78e4e8
                                                                                  • Instruction Fuzzy Hash: BF410236601A428FCB20CF28CC845BEBBE7FFD9315F95852AE8468B250EB318D41C794
                                                                                  APIs
                                                                                  • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 005A7B3F
                                                                                  • GetLastError.KERNEL32 ref: 005A7B50
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005A7B66
                                                                                  • GetExitCodeProcess.KERNEL32(?,000000FF), ref: 005A7B77
                                                                                  • CloseHandle.KERNEL32(?), ref: 005A7B81
                                                                                  • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 005A7B9C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessWow64$CloseCodeCreateErrorExitHandleLastObjectRedirectionRevertSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3742689608-0
                                                                                  • Opcode ID: c822f0282379f476cf1b2fd910214e4a04b0e83d784e3a79bb83ec0db3ddaf5c
                                                                                  • Instruction ID: d45792f916881f5a86cc71d2eee94af46b790571e1637fa71d42f107dcbdea1f
                                                                                  • Opcode Fuzzy Hash: c822f0282379f476cf1b2fd910214e4a04b0e83d784e3a79bb83ec0db3ddaf5c
                                                                                  • Instruction Fuzzy Hash: A8416DB1E0874DDBDB10CFA5CD45BAEBBB9FB59710F109259E821A7290E73099448FA0
                                                                                  APIs
                                                                                  • SymGetLineFromAddr.IMAGEHLP(?,?,?,?,5D2E80A5), ref: 005AC85E
                                                                                    • Part of subcall function 005AC210: LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 005AC26E
                                                                                    • Part of subcall function 005AC210: GetProcAddress.KERNEL32(00000000), ref: 005AC275
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddrAddressFromLibraryLineLoadProc
                                                                                  • String ID: -> $%hs()$%hs:%ld$[0x%.8Ix]
                                                                                  • API String ID: 2196328783-3499247214
                                                                                  • Opcode ID: 0fd9f1a571000f65b169b92cef51d0c7b0b9a17e4433a0f3e0d67c29149142ec
                                                                                  • Instruction ID: c2965ab78842829d591beeca25e9adda7153531752cc47a865c1377ebfad733c
                                                                                  • Opcode Fuzzy Hash: 0fd9f1a571000f65b169b92cef51d0c7b0b9a17e4433a0f3e0d67c29149142ec
                                                                                  • Instruction Fuzzy Hash: 5CE19A70D002699ADB28DF24CC98BEEBBB5FF85314F1042D9E519A7281DB785B84CF90
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,00000425), ref: 005D5E2D
                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 005D5E38
                                                                                  • GetWindowTextW.USER32(?,?,?), ref: 005D5E91
                                                                                  • MessageBeep.USER32(000000FF), ref: 005D5ED6
                                                                                  • GetDlgItem.USER32(?,00000425), ref: 005D5EEB
                                                                                  • SetFocus.USER32(00000000), ref: 005D5EF2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemTextWindow$BeepFocusLengthMessage
                                                                                  • String ID:
                                                                                  • API String ID: 2221317226-0
                                                                                  • Opcode ID: 972234182ec02d5b8e959bb7fee0490c3eb7fb72f158f045028816d098938a05
                                                                                  • Instruction ID: b22ec90a2733a1c332f6306c2766940c86dde1deb4c1744f1675174bb55a9786
                                                                                  • Opcode Fuzzy Hash: 972234182ec02d5b8e959bb7fee0490c3eb7fb72f158f045028816d098938a05
                                                                                  • Instruction Fuzzy Hash: 5231E271601A06DFCB14EF2CC889C6EBFA5FF84311B10466EF815CB2A0EB31A955DB90
                                                                                  APIs
                                                                                  • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,00000100,?,80000000), ref: 005CE2F3
                                                                                  • VerSetConditionMask.KERNEL32(00000000), ref: 005CE2FB
                                                                                  • VerSetConditionMask.KERNEL32(00000000), ref: 005CE303
                                                                                  • VerifyVersionInfoW.KERNEL32(?), ref: 005CE32C
                                                                                  • GetParent.USER32(005CCF9A), ref: 005CE349
                                                                                  • SendMessageW.USER32(?,00000432,00000000,00000023), ref: 005CE382
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConditionMask$InfoMessageParentSendVerifyVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2374517313-0
                                                                                  • Opcode ID: 08757dcf89db17e20686d156ccf9b235c2371ac89d82a7c54bf81614762a88f4
                                                                                  • Instruction ID: 6c4f35cb8f2608107527d7d2e87d4cb5c5369878950da7491c9ff7fc6f1c1ba9
                                                                                  • Opcode Fuzzy Hash: 08757dcf89db17e20686d156ccf9b235c2371ac89d82a7c54bf81614762a88f4
                                                                                  • Instruction Fuzzy Hash: 7A3171B1558344AFE320DF64DC0AB9BBBE8FBC9704F008A1EF588D6290D7B496448F56
                                                                                  APIs
                                                                                    • Part of subcall function 005EF400: WaitForSingleObject.KERNEL32(?,000000FF,?,?), ref: 005EF45E
                                                                                    • Part of subcall function 005EF400: GetLastError.KERNEL32 ref: 005EF469
                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,005F0A9E,?), ref: 005F069A
                                                                                  • GetLastError.KERNEL32(?,?,005F0A9E,?), ref: 005F06A4
                                                                                  • SetEvent.KERNEL32(?,?,?,005F0A9E,?), ref: 005F06B0
                                                                                  • GetLastError.KERNEL32(?,?,005F0A9E,?), ref: 005F06BA
                                                                                  • EnterCriticalSection.KERNEL32(?,?,?,005F0A9E,?), ref: 005F06D8
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,005F0A9E,?), ref: 005F06F4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CriticalEventSection$EnterLeaveObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3090723020-0
                                                                                  • Opcode ID: 01e89b48096dc29ff39f598d7ab07706ff67f77e4abca18223a408d7e3209cb9
                                                                                  • Instruction ID: b4e76d942dfe9391f0bc80fea3cd1d3a9e222183253897989b94b54f422ca982
                                                                                  • Opcode Fuzzy Hash: 01e89b48096dc29ff39f598d7ab07706ff67f77e4abca18223a408d7e3209cb9
                                                                                  • Instruction Fuzzy Hash: 0F21D371600B08CFC720DFA9D808BABBBE9FF88710F08591EE65AC7251D734A8118B60
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,005F65D1,005ACFDC,006337E8,00000002,5D2E80A5), ref: 005F65E8
                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005F65F6
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005F660F
                                                                                  • SetLastError.KERNEL32(00000000,?,005F65D1,005ACFDC,006337E8,00000002,5D2E80A5), ref: 005F6661
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                  • String ID:
                                                                                  • API String ID: 3852720340-0
                                                                                  • Opcode ID: 77ea6750ae05ffb764b913e68c17cf837c1a7b6b056d72c4ec318dc25777e9c0
                                                                                  • Instruction ID: 0bab34696d4d3b45ddc4ead69a27bc26c514cf36b0b6b4ac28fd0cff6b7426f0
                                                                                  • Opcode Fuzzy Hash: 77ea6750ae05ffb764b913e68c17cf837c1a7b6b056d72c4ec318dc25777e9c0
                                                                                  • Instruction Fuzzy Hash: 3C01F73620D71B5EAB2427747C8EA3B2F56FB637783201A39F724960E0EF6A8C115244
                                                                                  APIs
                                                                                  • ResetEvent.KERNEL32(?,?,005F0A50), ref: 005EF1EB
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,005F0A50), ref: 005EF1FB
                                                                                  • GetLastError.KERNEL32 ref: 005EF20C
                                                                                  • ResetEvent.KERNEL32(?), ref: 005EF228
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000), ref: 005EF238
                                                                                  • GetLastError.KERNEL32 ref: 005EF249
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Event$CreateErrorLastReset
                                                                                  • String ID:
                                                                                  • API String ID: 3053278375-0
                                                                                  • Opcode ID: de3999965884ae98d1144089be69cd3881d9c1fd070118b34ca8fb27bc3c39e4
                                                                                  • Instruction ID: 6304bf1bb8fbe408772567452c377e6eba84b9b58a21323dd16ee68d1c4ca5e1
                                                                                  • Opcode Fuzzy Hash: de3999965884ae98d1144089be69cd3881d9c1fd070118b34ca8fb27bc3c39e4
                                                                                  • Instruction Fuzzy Hash: 8B012C3834A7429BEB7C5B76AC19F263AD57B40B01F10543DFA87D52C0EFA0E8019B14
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 005BEE88
                                                                                  • GetForegroundWindow.USER32(?,?,?,0061FB6D,000000FF), ref: 005BEE98
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 005BEED2
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • OutputDebugStringW.KERNEL32(?,5D2E80A5,00000000,?,?,?,?,?,0061FB6D,000000FF,?,005CB890,?,?,?,?), ref: 005BEF3B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Foreground$ActiveDebugHeapOutputProcessString
                                                                                  • String ID: he
                                                                                  • API String ID: 799693181-2125610711
                                                                                  • Opcode ID: 9e17bda1e1d355d3fcf7dee10338879fa61219204d4ca6d44a83b944af71e362
                                                                                  • Instruction ID: 3e533aa2808a2d5a23d57de041559ce075c0e9f2f76a5df88db57f02b1d9cfda
                                                                                  • Opcode Fuzzy Hash: 9e17bda1e1d355d3fcf7dee10338879fa61219204d4ca6d44a83b944af71e362
                                                                                  • Instruction Fuzzy Hash: 3D71C175A006058FDB14DF68C85A6EEBBF6FF88320F19415DE815A7390DB35AD02CB91
                                                                                  APIs
                                                                                  • InitializeCriticalSection.KERNEL32(?,5D2E80A5), ref: 005AA57C
                                                                                  • EnterCriticalSection.KERNEL32(?,5D2E80A5), ref: 005AA589
                                                                                  • OutputDebugStringW.KERNEL32(?,?,00000000), ref: 005AA655
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0061BE7D,000000FF), ref: 005AA718
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  Strings
                                                                                  • Logger::SetLogFile( %s ) while OLD path is:%s, xrefs: 005AA5D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$AllocateDebugEnterHeapInitializeLeaveOutputString
                                                                                  • String ID: Logger::SetLogFile( %s ) while OLD path is:%s
                                                                                  • API String ID: 117955849-1927537607
                                                                                  • Opcode ID: c655fb7a26acba359ae1a94e6b86f43a29fe8db2fc27487109c2db6e0f4eecd5
                                                                                  • Instruction ID: acfa3e07e636657dfd425dcb8874b3e3d95fd3c5391731745050ec562d557392
                                                                                  • Opcode Fuzzy Hash: c655fb7a26acba359ae1a94e6b86f43a29fe8db2fc27487109c2db6e0f4eecd5
                                                                                  • Instruction Fuzzy Hash: 0061F035900615CFCF10DF68C814AAEBFB1FF4A310F190598E812AB391DB319E02DBA1
                                                                                  APIs
                                                                                  • PathIsUNCW.SHLWAPI(?,5D2E80A5,?,?,00000000,?,?,?,?,?,?,?,?,00000000,0061B56F,000000FF), ref: 005A720B
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,?,?,006337AC,00000001,?,5D2E80A5), ref: 005A72CA
                                                                                  • GetLastError.KERNEL32(?,5D2E80A5), ref: 005A72D8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLastPath
                                                                                  • String ID: \\?\$\\?\UNC\
                                                                                  • API String ID: 953296794-3019864461
                                                                                  • Opcode ID: 66704687ea8df7babc2607f117edddf883e38aa0853b9f36b77dcc1b909d5ef6
                                                                                  • Instruction ID: d02f6b7db0884704fbe428dbaa1e2ce604d5f2bb79d4a9077481550e1187c0ff
                                                                                  • Opcode Fuzzy Hash: 66704687ea8df7babc2607f117edddf883e38aa0853b9f36b77dcc1b909d5ef6
                                                                                  • Instruction Fuzzy Hash: 1B61B030A0460ACFDF14DFA8C899BADBBF5FF49310F154569E821E7291DB319905CBA1
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$DeleteDirectoryFileRemove
                                                                                  • String ID: H
                                                                                  • API String ID: 50330452-2852464175
                                                                                  • Opcode ID: 4871b1f82eaa79a1fe5e73198c3ab2285a5964a65f2137fbf86dc41e9955672b
                                                                                  • Instruction ID: 214e9fa6c13feb7e2ebd0372d7926ad4efdd08ff394970e176d3bd2a51043d1b
                                                                                  • Opcode Fuzzy Hash: 4871b1f82eaa79a1fe5e73198c3ab2285a5964a65f2137fbf86dc41e9955672b
                                                                                  • Instruction Fuzzy Hash: 2E517E31900219CFCF20CFA4C989BEEBBB5FB45304F1585A8D805BB251D779B948CBA1
                                                                                  APIs
                                                                                  • EnterCriticalSection.KERNEL32(00650A1C,5D2E80A5), ref: 0059F82F
                                                                                  • DestroyWindow.USER32(00000000), ref: 0059F84D
                                                                                  • LeaveCriticalSection.KERNEL32(00650A1C), ref: 0059F896
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$DestroyEnterLeaveWindow
                                                                                  • String ID: ,e$,e
                                                                                  • API String ID: 1456685395-3154685309
                                                                                  • Opcode ID: e23bab8e57fabd8547ad78f9e920eab929eeaa2627167f463f275823ee7d4262
                                                                                  • Instruction ID: 471855d4bb5f6accf02c3b5fff2c8c145360285efa2d1016e868d03584ab3f30
                                                                                  • Opcode Fuzzy Hash: e23bab8e57fabd8547ad78f9e920eab929eeaa2627167f463f275823ee7d4262
                                                                                  • Instruction Fuzzy Hash: 5341BC71A017119BEB20DF28DC09B1ABFFAFF45B15F180529E855EB790D7B4A840CB91
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(combase.dll,RoOriginateLanguageException), ref: 00595484
                                                                                  • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 0059548A
                                                                                  • GetErrorInfo.OLEAUT32(00000000,00000000), ref: 005954DA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressErrorInfoLibraryLoadProc
                                                                                  • String ID: RoOriginateLanguageException$combase.dll
                                                                                  • API String ID: 1186719886-3996158991
                                                                                  • Opcode ID: e6f8e4b02d281e9535972b9793a91507a746908e1aa9ea731310434e3f50b4ac
                                                                                  • Instruction ID: 31b75de52ffb3e73241166769d4b8b377b27f5caf6c80ed571abe9efd1c1eb4f
                                                                                  • Opcode Fuzzy Hash: e6f8e4b02d281e9535972b9793a91507a746908e1aa9ea731310434e3f50b4ac
                                                                                  • Instruction Fuzzy Hash: DA318A7190061ADBDF21DF94D849BAEBFB4FB40724F10022AE914A72D0E7B45E44CBD1
                                                                                  APIs
                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,5D2E80A5,00000000,?,00000001,00626170,000000FF,?,006041C6,?,?,0060419D,?,?), ref: 00604206
                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00604218
                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000001,00626170,000000FF,?,006041C6,?,?,0060419D,?,?), ref: 0060423A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 5cf9b6ec07e320c552a92164e97a5cedd10891cd2dc8f16ae303180d243a2f6c
                                                                                  • Instruction ID: 0f4ac70cc54bd099063ea4eb06896e463c9ecea56461df7fae0010edccfa8c06
                                                                                  • Opcode Fuzzy Hash: 5cf9b6ec07e320c552a92164e97a5cedd10891cd2dc8f16ae303180d243a2f6c
                                                                                  • Instruction Fuzzy Hash: FD01D671A44A29EFDB218F50DC09FEFBBBAFB04B15F000525F811A26D0DB749900CB90
                                                                                  APIs
                                                                                    • Part of subcall function 005F46AF: AcquireSRWLockExclusive.KERNEL32(0064FFB8,?,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46BA
                                                                                    • Part of subcall function 005F46AF: ReleaseSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583A56,00650848,5D2E80A5,?,?,0061516D,000000FF,?,005C10B6,5D2E80A5,?), ref: 005F46F4
                                                                                  • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 005AC26E
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 005AC275
                                                                                    • Part of subcall function 005F465E: AcquireSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583AC7,00650848,00626460), ref: 005F4668
                                                                                    • Part of subcall function 005F465E: ReleaseSRWLockExclusive.KERNEL32(0064FFB8,?,?,00583AC7,00650848,00626460), ref: 005F469B
                                                                                    • Part of subcall function 005F465E: WakeAllConditionVariable.KERNEL32(0064FFB4,?,?,00583AC7,00650848,00626460), ref: 005F46A6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExclusiveLock$AcquireRelease$AddressConditionLibraryLoadProcVariableWake
                                                                                  • String ID: Dbghelp.dll$SymFromAddr$7c
                                                                                  • API String ID: 1702099962-559038804
                                                                                  • Opcode ID: 72316650fdfd92583fb63781f39d3d34603d43d770af0fb88536a40e2acbedab
                                                                                  • Instruction ID: 53d9674e712b0431f0b7c9ce390713c301efc75a5d522be5381b40590807726e
                                                                                  • Opcode Fuzzy Hash: 72316650fdfd92583fb63781f39d3d34603d43d770af0fb88536a40e2acbedab
                                                                                  • Instruction Fuzzy Hash: 0301DFB6944B46DFC710CF98ED09B0D7BA6F70AB25F108225F82AC33D1DB35A9008E51
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00607144,00000000,?,?,?,?,00607268,0000001A,AppPolicyGetProcessTerminationMethod,0062D708,AppPolicyGetProcessTerminationMethod,00000000), ref: 006071E9
                                                                                  • GetLastError.KERNEL32(?,00607144,00000000,?,?,?,?,00607268,0000001A,AppPolicyGetProcessTerminationMethod,0062D708,AppPolicyGetProcessTerminationMethod,00000000,?,0060986F,00000000), ref: 006071F3
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?,?,?), ref: 00607231
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                  • String ID: api-ms-$ext-ms-
                                                                                  • API String ID: 3177248105-537541572
                                                                                  • Opcode ID: 376cb72d6a04a903aedbe9ca70c253a9b7d92e1ca469b2d922eed4c069b2360a
                                                                                  • Instruction ID: 20e7d0d8d68c6597a17e6e64092f11cd90d710752f108ca2c0a71c316faec7b7
                                                                                  • Opcode Fuzzy Hash: 376cb72d6a04a903aedbe9ca70c253a9b7d92e1ca469b2d922eed4c069b2360a
                                                                                  • Instruction Fuzzy Hash: 88F0A771AC8605B7DB201F61EC06F6A3E5BBB51B45F104021FA4CA41E1D7B5FA5185D1
                                                                                  APIs
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 005D63B6
                                                                                  • IsWindowVisible.USER32(?), ref: 005D6401
                                                                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 005D6417
                                                                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 005D660E
                                                                                  • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 005D6627
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSend$LongRedrawVisible
                                                                                  • String ID:
                                                                                  • API String ID: 554559110-0
                                                                                  • Opcode ID: adb1917d31627817be488fcfabf8374a2eac6b31e5d351d5b72cfc275a64c35f
                                                                                  • Instruction ID: ea6912200841307730e8176cf615ba1e04e54be7e6ca27fcaab62ca2b9a99e1e
                                                                                  • Opcode Fuzzy Hash: adb1917d31627817be488fcfabf8374a2eac6b31e5d351d5b72cfc275a64c35f
                                                                                  • Instruction Fuzzy Hash: 7E911371A083519FC724CF18C884A1ABBF6BFC8710F554A1EF995A7290D771E846CB82
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • SetWindowTextW.USER32(?,00623AD5), ref: 005D5C9E
                                                                                  • GetDlgItem.USER32(?,0000042B), ref: 005D5D02
                                                                                  • SetWindowTextW.USER32(00000000,00000000), ref: 005D5D0D
                                                                                  • GetDlgItem.USER32(?,00000001), ref: 005D5D17
                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 005D5D20
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(?,000000F0), ref: 005BBEE7
                                                                                    • Part of subcall function 005BBEA0: GetParent.USER32(00000000), ref: 005BBEFA
                                                                                    • Part of subcall function 005BBEA0: GetWindowRect.USER32(?,?), ref: 005BBF13
                                                                                    • Part of subcall function 005BBEA0: GetWindowLongW.USER32(00000000,000000F0), ref: 005BBF26
                                                                                    • Part of subcall function 005BBEA0: MonitorFromWindow.USER32(?,00000002), ref: 005BBF3E
                                                                                    • Part of subcall function 005BBEA0: GetMonitorInfoW.USER32(00000000,?), ref: 005BBF54
                                                                                    • Part of subcall function 005D5F10: GetWindowLongW.USER32(?,000000F0), ref: 005D5F3D
                                                                                    • Part of subcall function 005D5F10: GetWindowLongW.USER32(?,000000F0), ref: 005D5F52
                                                                                    • Part of subcall function 005D5F10: SetWindowLongW.USER32(?,000000F0,00000000), ref: 005D5F69
                                                                                    • Part of subcall function 005D5F10: GetWindowLongW.USER32(?,000000EC), ref: 005D5F82
                                                                                    • Part of subcall function 005D5F10: SetWindowLongW.USER32(?,000000EC,00000000), ref: 005D5F96
                                                                                    • Part of subcall function 005D5F10: SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 005D5FA4
                                                                                    • Part of subcall function 005D5F10: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005D5FB7
                                                                                    • Part of subcall function 005D5F10: GetDlgItem.USER32(?,0000E801), ref: 005D5FC4
                                                                                    • Part of subcall function 005D5F10: IsWindow.USER32(00000000), ref: 005D5FCD
                                                                                    • Part of subcall function 005D5F10: DestroyWindow.USER32(00000000,?,00000000), ref: 005D5FE9
                                                                                    • Part of subcall function 005D5F10: GetClientRect.USER32(?,?), ref: 005D6041
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$Item$MessageMonitorRectSendText$ClientDestroyEnableFromHeapInfoParentProcess
                                                                                  • String ID:
                                                                                  • API String ID: 3895391425-0
                                                                                  • Opcode ID: a15ce603b19b32606f620832b2b11d8b6eaaeaf29c330f8568705dd69c6405d7
                                                                                  • Instruction ID: cfe58b8cd95a1623e8901dd9bc8485003b57677c862bbb2461ce1b1d1cda48aa
                                                                                  • Opcode Fuzzy Hash: a15ce603b19b32606f620832b2b11d8b6eaaeaf29c330f8568705dd69c6405d7
                                                                                  • Instruction Fuzzy Hash: 8161A331A00A159FDB10EFA8CC99AAEBBB5FF48320F144169E511E73A1DB349E05DF91
                                                                                  APIs
                                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,5D2E80A5,00000000,?,?,?,?,?,?,?,00000000,006220FD,000000FF), ref: 005CBC8D
                                                                                  • CreateThread.KERNEL32(00000000,00000000,005CC060,?,00000000,?), ref: 005CBCDD
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 005CBE07
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create$EventObjectSingleThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 1077646455-0
                                                                                  • Opcode ID: 4d51604c9497667c373cdb30da0f08c985db5bd784194131a6516907e1f20902
                                                                                  • Instruction ID: 749931568fb287bc7c1e0fa6ae42685254b88b88daa357a67b1a41f3d2a9b64a
                                                                                  • Opcode Fuzzy Hash: 4d51604c9497667c373cdb30da0f08c985db5bd784194131a6516907e1f20902
                                                                                  • Instruction Fuzzy Hash: 93613975A002199FDB14CF98C885FAEBBB6FF88B10F254159E915AB394D730AD41CBA0
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 005F417E
                                                                                  • AcquireSRWLockExclusive.KERNEL32(0058FCB8,?,00000000,00626214,000000FF,?,0058FCB8), ref: 005F419D
                                                                                  • AcquireSRWLockExclusive.KERNEL32(0058FCB8,?,?,?,00000000,00626214,000000FF,?,0058FCB8), ref: 005F41CB
                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(0058FCB8,?,?,?,00000000,00626214,000000FF,?,0058FCB8), ref: 005F4226
                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(0058FCB8,?,?,?,00000000,00626214,000000FF,?,0058FCB8), ref: 005F423D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                                  • String ID:
                                                                                  • API String ID: 66001078-0
                                                                                  • Opcode ID: e90ced768ae6fdfef4c4c3fdc5513428e457cec7f074ea970535cea7d13edd46
                                                                                  • Instruction ID: d0153742bb6561cf7bcfc8f68392eb891a5385c3ccb39ebc21b39372b8a6d152
                                                                                  • Opcode Fuzzy Hash: e90ced768ae6fdfef4c4c3fdc5513428e457cec7f074ea970535cea7d13edd46
                                                                                  • Instruction Fuzzy Hash: 7341283890060ADBCB20CF64C48597BBBF9FF44350F204A2AE65697650D738E985CF50
                                                                                  APIs
                                                                                    • Part of subcall function 005AF270: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,FF005A36,5D2E80A5,00000000,00000000,00000000), ref: 005AF2CB
                                                                                  • GetFileVersionInfoSizeW.VERSION(?,FF005E62,?,5D2E80A5,00000000,?,00000000), ref: 005AF81D
                                                                                  • GetFileVersionInfoW.VERSION(?,?,?,?,00000000), ref: 005AF849
                                                                                  • VerQueryValueW.VERSION(?,006337AC,FF005E6A,FF005E5E), ref: 005AF861
                                                                                  • GetLastError.KERNEL32 ref: 005AF88E
                                                                                  • DeleteFileW.KERNEL32(?), ref: 005AF8A1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$InfoVersion$DeleteErrorFolderLastPathQuerySizeValue
                                                                                  • String ID:
                                                                                  • API String ID: 1753006064-0
                                                                                  • Opcode ID: d84739aa09db2cc07b85c9e28cdc2768e5798e2dd3166cac4268e451eddb9ea3
                                                                                  • Instruction ID: fd49f98878622394c9c0a3e949db62a3c49479bd4fb1b5ecb60ba28c26e7a13e
                                                                                  • Opcode Fuzzy Hash: d84739aa09db2cc07b85c9e28cdc2768e5798e2dd3166cac4268e451eddb9ea3
                                                                                  • Instruction Fuzzy Hash: 93315CB1A0120AABDB14CFE5DD84BEFBFB8FF49750F144169E815A3240D7389944CBA1
                                                                                  APIs
                                                                                    • Part of subcall function 005F0B70: SetEvent.KERNEL32(00000002,?,005EA8BE,5D2E80A5), ref: 005F0B7F
                                                                                    • Part of subcall function 005F0B70: GetLastError.KERNEL32(?,005EA8BE,5D2E80A5), ref: 005F0B89
                                                                                    • Part of subcall function 005F0B70: WaitForSingleObject.KERNEL32(?,000000FF,?,005EA8BE,5D2E80A5), ref: 005F0B99
                                                                                    • Part of subcall function 005F0B70: GetLastError.KERNEL32(?,005EA8BE,5D2E80A5), ref: 005F0BA4
                                                                                    • Part of subcall function 005F0B70: CloseHandle.KERNEL32(?,?,005EA8BE,5D2E80A5), ref: 005F0BB2
                                                                                  • CloseHandle.KERNEL32(?,5D2E80A5), ref: 005EA8CA
                                                                                  • GetLastError.KERNEL32 ref: 005EA8D4
                                                                                  • CloseHandle.KERNEL32(?,5D2E80A5), ref: 005EA8F8
                                                                                  • GetLastError.KERNEL32 ref: 005EA902
                                                                                  • CloseHandle.KERNEL32(?,5D2E80A5), ref: 005EA92B
                                                                                  • GetLastError.KERNEL32 ref: 005EA935
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CloseHandle$EventObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 2212007442-0
                                                                                  • Opcode ID: ee8897d89aa0e17154aaabc5bc4a80566c81583c0944ce3d7518325f6fe04d82
                                                                                  • Instruction ID: 9cf8bf085e84fc76bf92e2ad9b306b6645b809af6070bc8262965cd16394639c
                                                                                  • Opcode Fuzzy Hash: ee8897d89aa0e17154aaabc5bc4a80566c81583c0944ce3d7518325f6fe04d82
                                                                                  • Instruction Fuzzy Hash: FF2192B1908745DFD724CF69D908B5ABFF8FB00720F10465EE895D3280D775A904CBA1
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00594850
                                                                                    • Part of subcall function 005F2F0C: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,?,?,?,00594866,?,?,00000000,?,?,?,0058B64C), ref: 005F2F18
                                                                                    • Part of subcall function 005F2F0C: GetExitCodeThread.KERNEL32(?,0058B64C,?,?,00594866,?,?,00000000,?,?,?,0058B64C), ref: 005F2F31
                                                                                    • Part of subcall function 005F2F0C: CloseHandle.KERNEL32(?,?,?,00594866,?,?,00000000,?,?,?,0058B64C,?,?,?,?,00000000), ref: 005F2F43
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00594879
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00594880
                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00594887
                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 005948D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cpp_errorThrow_std::_$Thread$CloseCodeCurrentExitHandleObjectSingleWait___std_exception_copy
                                                                                  • String ID:
                                                                                  • API String ID: 2568938302-0
                                                                                  • Opcode ID: 6506f24a23fcda83dc4b5ca0d2eba09a199bd3ba13008b095a5be5dbb6987693
                                                                                  • Instruction ID: fd129a2a6d560fcb7ac6263cbea8511cff0de61a32042c1383d104005df30985
                                                                                  • Opcode Fuzzy Hash: 6506f24a23fcda83dc4b5ca0d2eba09a199bd3ba13008b095a5be5dbb6987693
                                                                                  • Instruction Fuzzy Hash: D62108B1910719ABD720DF94CC06BA6BBEDFF05710F104A2EFA64976C0E7B5A900CB91
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,00606C08,?,005FFA29,?,00000004,00000000,00000000,?,?,00604979,?,00000000,00000004,?), ref: 00606A51
                                                                                  • SetLastError.KERNEL32(00000000,000000FF,?,005FFA29,?,00000004,00000000,00000000,?,?,00604979,?,00000000,00000004,?), ref: 00606A6B
                                                                                  • SetLastError.KERNEL32(00000000,00000000,00000000,?,000000FF,?,005FFA29,?,00000004,00000000,00000000,?,?,00604979,?,00000000), ref: 00606AA1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: Xd
                                                                                  • API String ID: 1452528299-2515267296
                                                                                  • Opcode ID: 83eea9e9403b15d5d460aa6bd35f82de603302a884bec2d396141c30e06057b1
                                                                                  • Instruction ID: afe461900eb22d72d3e7aa6bd9f88bda5c68211585c37d6f1a3b31ed0dc1817d
                                                                                  • Opcode Fuzzy Hash: 83eea9e9403b15d5d460aa6bd35f82de603302a884bec2d396141c30e06057b1
                                                                                  • Instruction Fuzzy Hash: 4201DE317C86117EE75D37B0FC4AE2B2A5BEF813A8B004538F901A11E2EA615C225269
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00594BCA
                                                                                  • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00594BD0
                                                                                  • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,00000000,00000000,00000000), ref: 00594BF3
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00594C1B
                                                                                  • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00594C21
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$FreeProcess$FormatMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1606019998-0
                                                                                  • Opcode ID: db100d593ef1f892fbe6edf5e119ee91ad997d42a33b5a9b901a8b7b639aa32b
                                                                                  • Instruction ID: d2fe34740f8723a7c8b383471295a2d157f89d0d0141eb3da77aafedb3d4f35a
                                                                                  • Opcode Fuzzy Hash: db100d593ef1f892fbe6edf5e119ee91ad997d42a33b5a9b901a8b7b639aa32b
                                                                                  • Instruction Fuzzy Hash: 1E1146B1A44219ABEF00DF94DC09FAFBBBCFB44B04F104519F914AB2C1D7B599048B95
                                                                                  APIs
                                                                                  • SetEvent.KERNEL32(00000002,?,005EA8BE,5D2E80A5), ref: 005F0B7F
                                                                                  • GetLastError.KERNEL32(?,005EA8BE,5D2E80A5), ref: 005F0B89
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,005EA8BE,5D2E80A5), ref: 005F0B99
                                                                                  • GetLastError.KERNEL32(?,005EA8BE,5D2E80A5), ref: 005F0BA4
                                                                                  • CloseHandle.KERNEL32(?,?,005EA8BE,5D2E80A5), ref: 005F0BB2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CloseEventHandleObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 891035169-0
                                                                                  • Opcode ID: a9dfa3b65616a78e235fa0e5b1fc4e08bd925b3757b58f32e9eef5a53a976c9e
                                                                                  • Instruction ID: 8b1e2e6be85051b72e5b671b9b3e45f8fcd43ff1deec2e14871edd775707c1e0
                                                                                  • Opcode Fuzzy Hash: a9dfa3b65616a78e235fa0e5b1fc4e08bd925b3757b58f32e9eef5a53a976c9e
                                                                                  • Instruction Fuzzy Hash: 76F05B702056058BD7305B35BC08F6B7BD97F14379B189615E962C22D1D774D8058660
                                                                                  APIs
                                                                                  • DeleteFileW.KERNEL32(?,5D2E80A5,?), ref: 005B659F
                                                                                  • CloseHandle.KERNEL32(?), ref: 005B6744
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseDeleteFileHandle
                                                                                  • String ID: ,ic$0ic
                                                                                  • API String ID: 2633145722-262660716
                                                                                  • Opcode ID: 1f68ec4728e9e17963044378f18a8f814fe069908a6d497d105942b79e8ffc92
                                                                                  • Instruction ID: 2abdba09a8f60af4e5723276f04773e79fe856590c4e190844a457d4e85a8873
                                                                                  • Opcode Fuzzy Hash: 1f68ec4728e9e17963044378f18a8f814fe069908a6d497d105942b79e8ffc92
                                                                                  • Instruction Fuzzy Hash: 3CC1A034A01645CFDB01DF68C95879C7BE5FF49320F1981A9D859AB3D2CB34AE02DBA1
                                                                                  APIs
                                                                                    • Part of subcall function 005AFB40: SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,80000002,80000002,00650A68), ref: 005AFB50
                                                                                    • Part of subcall function 005AFB40: LoadLibraryW.KERNEL32(Shell32.dll,?,80000002,80000002,00650A68), ref: 005AFB63
                                                                                    • Part of subcall function 005AFB40: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 005AFB73
                                                                                  • PathFileExistsW.SHLWAPI(?,ADVINST_LOGS,0000000C,00650A68), ref: 005AB710
                                                                                    • Part of subcall function 00583620: RtlAllocateHeap.NTDLL(00000000,00000000,?,5D2E80A5,00000000,00615110,000000FF,?,?,0064B028,?,?,005C1A0D,80004005,5D2E80A5,?), ref: 0058366A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressAllocateExistsFileFolderHeapLibraryLoadLocationPathProcSpecial
                                                                                  • String ID: ADVINST_LOGS$Everyone
                                                                                  • API String ID: 3321256476-3921853867
                                                                                  • Opcode ID: 9df0a17fc2dad26f0f55042c2028fd8faa2a3c7f03cb93fd610a62943d5bbcba
                                                                                  • Instruction ID: 8a751edcd059dbe5c7b4eda2f929123013d0b91487909692747a1710e735e6b4
                                                                                  • Opcode Fuzzy Hash: 9df0a17fc2dad26f0f55042c2028fd8faa2a3c7f03cb93fd610a62943d5bbcba
                                                                                  • Instruction Fuzzy Hash: 06A1BD71901609DFEB00DFA8C959BAEBBB5FF85320F244148E911B7392DB755E05CBA0
                                                                                  APIs
                                                                                  • PathIsUNCW.SHLWAPI(?,?,?,?,5D2E80A5,*.*,?), ref: 005A4150
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path
                                                                                  • String ID: *.*$\\?\$\\?\UNC\
                                                                                  • API String ID: 2875597873-1700010636
                                                                                  • Opcode ID: 81b7175f9101b64f346ddacf9227fc5450c90d44fadf529744ab161246bfb132
                                                                                  • Instruction ID: ba69bafdf866658b3b8ec73b0aec66d07286582892a454ce18480f91893bc0c0
                                                                                  • Opcode Fuzzy Hash: 81b7175f9101b64f346ddacf9227fc5450c90d44fadf529744ab161246bfb132
                                                                                  • Instruction Fuzzy Hash: AA91FF70A00616CBCB14DFA8C849BAEBBB5FF85324F144269E515AB391D7B5AE41CF80
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • GetLastError.KERNEL32 ref: 005D3BD2
                                                                                  • WaitForSingleObject.KERNEL32(?,0000000A), ref: 005D3C1F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorHeapLastObjectProcessSingleWait
                                                                                  • String ID: IFa$REST %u
                                                                                  • API String ID: 1530046183-1137722673
                                                                                  • Opcode ID: fe6ddfa8877416b230ea00670432af1e3a41c61da4d933ae484a7365a1a6a97d
                                                                                  • Instruction ID: 469bb010b6419f3948899ac6e3877994bc3f286ed0fdfc87c1daf021eeab70c0
                                                                                  • Opcode Fuzzy Hash: fe6ddfa8877416b230ea00670432af1e3a41c61da4d933ae484a7365a1a6a97d
                                                                                  • Instruction Fuzzy Hash: 4151D2316006059FDB24DF2CCC89B69BFA6BF84321F14425AE812AB3E1DB749E45CB91
                                                                                  APIs
                                                                                  • ReadFile.KERNEL32(?,?,00000002,?,00000000,?,00000000,00000000,?,?,00612C2C,?,?,?), ref: 0061253A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileRead
                                                                                  • String ID: ,,a$,,a$,,a
                                                                                  • API String ID: 2738559852-1172751164
                                                                                  • Opcode ID: bd96b6341df71b8b38ac8dff3f39c9ff79a025d3921c421f3aeb76785ffca89e
                                                                                  • Instruction ID: ab83b15e1e484081f87d2db4bb1301a08a020d4897a7f77c70adda3c288c52d1
                                                                                  • Opcode Fuzzy Hash: bd96b6341df71b8b38ac8dff3f39c9ff79a025d3921c421f3aeb76785ffca89e
                                                                                  • Instruction Fuzzy Hash: FF510531A04216EBCB10CF48C8E0BED77B3AF48310F68815AE545AB391D330AE91DB95
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000), ref: 005C1AB2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID: .url$URL
                                                                                  • API String ID: 823142352-2674294872
                                                                                  • Opcode ID: d9ac86bbb901da55190de7a935f9af8cd7e01c1355fd1f50db1efa89f5f9cbfe
                                                                                  • Instruction ID: 1e3ddd9f2c9cdbcfe96ee994b0f09a5652a12d5fd1aacd3520c0520312beabf2
                                                                                  • Opcode Fuzzy Hash: d9ac86bbb901da55190de7a935f9af8cd7e01c1355fd1f50db1efa89f5f9cbfe
                                                                                  • Instruction Fuzzy Hash: 0F3183B1C00619ABD720EF58DD0AB9EBFB8FB45710F104299ED25B72C1EB705A448FA5
                                                                                  APIs
                                                                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,?,00000000,80070057,80004005), ref: 005D1AEE
                                                                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000000,80070057,80004005), ref: 005D1B19
                                                                                  • GetLastError.KERNEL32 ref: 005D1B83
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateEvent$ErrorLast
                                                                                  • String ID: AdvancedInstaller
                                                                                  • API String ID: 1131763895-1372594473
                                                                                  • Opcode ID: bcd5e2c2a34bd173da40710e5d3cc5414c96d3747c022943647a83aa11a9f35e
                                                                                  • Instruction ID: 2313d4b689f8d289bf75dd2708c98b6bec8c782f2addaf16b747223f101a262f
                                                                                  • Opcode Fuzzy Hash: bcd5e2c2a34bd173da40710e5d3cc5414c96d3747c022943647a83aa11a9f35e
                                                                                  • Instruction Fuzzy Hash: 4A219331640704EBEB20EF24DD99F257FA9FB44705F10405BF9029B396EA72A801CB54
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(006337E8,00000000,00000800,?,005F92D8,?,?,00000000,?,?,?,005F9402,00000002,FlsGetValue,0062AA18,FlsGetValue), ref: 005F9334
                                                                                  • GetLastError.KERNEL32(?,005F92D8,?,?,00000000,?,?,?,005F9402,00000002,FlsGetValue,0062AA18,FlsGetValue,?,?,005F65FB), ref: 005F933E
                                                                                  • LoadLibraryExW.KERNEL32(006337E8,00000000,00000000,005ACFDC,006337E8,00000002,5D2E80A5), ref: 005F9366
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                  • String ID: api-ms-
                                                                                  • API String ID: 3177248105-2084034818
                                                                                  • Opcode ID: 6cafa04f2a244c8bd9c7929ef79a7c60743b9f6331b9f1737ecb488bcd6d773e
                                                                                  • Instruction ID: 5a86e38e68253f46c4eff663dc59a8d289c5d740cbf0a02837c1427fb932b3f4
                                                                                  • Opcode Fuzzy Hash: 6cafa04f2a244c8bd9c7929ef79a7c60743b9f6331b9f1737ecb488bcd6d773e
                                                                                  • Instruction Fuzzy Hash: 86E04F70688A0DF7EB311B61ED06F293F5ABB00B45F104461FB0CE80E1D7A6D8658955
                                                                                  APIs
                                                                                  • GetTempFileNameW.KERNEL32(?,00000000,00000000,?,5D2E80A5,?,00000004), ref: 005848C8
                                                                                  • MoveFileW.KERNEL32(?,00000000), ref: 00584C9B
                                                                                  • DeleteFileW.KERNEL32(?), ref: 00584CE5
                                                                                  • FreeLibrary.KERNEL32(?), ref: 00584F7B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$DeleteFreeLibraryMoveNameTemp
                                                                                  • String ID:
                                                                                  • API String ID: 2027907882-0
                                                                                  • Opcode ID: 1521517bb3ce4e64a98955cc722e2ba6c96509adedf1a7c98e69d7d29eb417c8
                                                                                  • Instruction ID: 19b919c3b0228bae69d834820088ddfb551711dc7d82a503cd4be91088fa3506
                                                                                  • Opcode Fuzzy Hash: 1521517bb3ce4e64a98955cc722e2ba6c96509adedf1a7c98e69d7d29eb417c8
                                                                                  • Instruction Fuzzy Hash: 5C125C70D1426A9ADB24EF24CC987ADBBB1BF54304F1042D9E849A7291EB756FC4CF81
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?,00000000), ref: 005E1E7D
                                                                                  • lstrlenW.KERNEL32(?), ref: 005E1E91
                                                                                  • CloseHandle.KERNEL32(?), ref: 005E1EE3
                                                                                  • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 005E1F11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen$CloseCreateFileHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2263087898-0
                                                                                  • Opcode ID: 613f35b9cecf8ec2f455977c001ce3829e636e3915c3822e758896c0db811268
                                                                                  • Instruction ID: 4f8f2c68447111efb13f9b690c7e83a2e98c942002676a86158dcd5f2b9d0eea
                                                                                  • Opcode Fuzzy Hash: 613f35b9cecf8ec2f455977c001ce3829e636e3915c3822e758896c0db811268
                                                                                  • Instruction Fuzzy Hash: BFF181B0A006488FCB28DF25C884B99BBF9FF88314F14859DE55A973A1D770AE85CF54
                                                                                  APIs
                                                                                  • GetConsoleOutputCP.KERNEL32(5D2E80A5,00000000,00000000,000000FE), ref: 00609F79
                                                                                    • Part of subcall function 0060CA8B: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,00000000,?,-00000008,-00000008,00000000,?,?,00609D6A,?,00000000), ref: 0060CAEA
                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0060A1CF
                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0060A215
                                                                                  • GetLastError.KERNEL32 ref: 0060A2B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                  • String ID:
                                                                                  • API String ID: 2112829910-0
                                                                                  • Opcode ID: 88866fcbe287b176ecf8a9db2bfc09e177940ae4298eec8dc43b315cdceae038
                                                                                  • Instruction ID: c126319a169a4e773a563b166e21ff1701fcda49ddfb23e9f3aee263e1871611
                                                                                  • Opcode Fuzzy Hash: 88866fcbe287b176ecf8a9db2bfc09e177940ae4298eec8dc43b315cdceae038
                                                                                  • Instruction Fuzzy Hash: 08D17D75D04248DFCB19CFE8C880AEEBBB6FF09340F18456AE415EB391E631AA45CB51
                                                                                  APIs
                                                                                  • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 005B59D2
                                                                                  • GetShortPathNameW.KERNEL32(?,?,?), ref: 005B5A51
                                                                                  • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 005B5AA1
                                                                                  • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,-00000001,00000000,00000000), ref: 005B5AD7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiNamePathShortWide
                                                                                  • String ID:
                                                                                  • API String ID: 3379522384-0
                                                                                  • Opcode ID: 4a9d7d6057d12261403f24793f4eed5205d4b6db6b1616b268da933e814a4225
                                                                                  • Instruction ID: 0f3c1103514843883467ef856c95a5e4c8b9767d428a93996d469940eb7a7ba1
                                                                                  • Opcode Fuzzy Hash: 4a9d7d6057d12261403f24793f4eed5205d4b6db6b1616b268da933e814a4225
                                                                                  • Instruction Fuzzy Hash: CC518E71600A06AFDB14DF58DC99BAEFBA9FF44324F104269E915AB390EB71B901CB50
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustPointer
                                                                                  • String ID:
                                                                                  • API String ID: 1740715915-0
                                                                                  • Opcode ID: 6972c02c10b7a488b779aee0ca7de231a7f8a6ee91d765fbadc4252b3fcd7e68
                                                                                  • Instruction ID: 7064e842a0c2f554fd4781370942c55c1479ba5fd9fefe09cacf4cc0c0ec3557
                                                                                  • Opcode Fuzzy Hash: 6972c02c10b7a488b779aee0ca7de231a7f8a6ee91d765fbadc4252b3fcd7e68
                                                                                  • Instruction Fuzzy Hash: 7051D17260061BAFDF298F14D849B7A7FA5FF44718F14492DEA42972A1EB39EC40C790
                                                                                  APIs
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,00000000,?,?,?,005C1B33,?,00000003), ref: 005C32FD
                                                                                  • GetLastError.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,005C1B33,?,00000003), ref: 005C330E
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,?,?), ref: 005C332F
                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,?,?), ref: 005C3381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1717984340-0
                                                                                  • Opcode ID: ca87c7a73b7f5a806a68c8acee116a53b5dad8981cb114333a4fda662b69016b
                                                                                  • Instruction ID: f43adcd272d5cabb3145db385e8c2750d51d9214de6a864b19232146192c700a
                                                                                  • Opcode Fuzzy Hash: ca87c7a73b7f5a806a68c8acee116a53b5dad8981cb114333a4fda662b69016b
                                                                                  • Instruction Fuzzy Hash: 4E415A7020434DBFDB202BE89C86F2B7E99FF44B04F20C92DFA46E5191EA66DA04C751
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorEventLast
                                                                                  • String ID:
                                                                                  • API String ID: 3848097054-0
                                                                                  • Opcode ID: 5d1a3aa5dc66e555dd7006a83cf5f525bac9a30e8c77a6a2fe8bc28782b84c59
                                                                                  • Instruction ID: 67f1e5d3e326e12fe7065fa07dc1219c1a6f2ffe6541704357b28873f4a7a78e
                                                                                  • Opcode Fuzzy Hash: 5d1a3aa5dc66e555dd7006a83cf5f525bac9a30e8c77a6a2fe8bc28782b84c59
                                                                                  • Instruction Fuzzy Hash: 706118B1601315CFEB24DF18C89876A3BE5BF44314F0952A9DD489F28BD7B9D849CB90
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: C*]$GET$Ea
                                                                                  • API String ID: 1452528299-220731963
                                                                                  • Opcode ID: cc29106ed0b18711c1c78c4daff4e096e94710b3904754423343cc8e110d715c
                                                                                  • Instruction ID: e26cfd36dab47497e57cfc5680fac529eb9b3255c461e1c92fb2e32a93f0fb4f
                                                                                  • Opcode Fuzzy Hash: cc29106ed0b18711c1c78c4daff4e096e94710b3904754423343cc8e110d715c
                                                                                  • Instruction Fuzzy Hash: 7C41A771D0061AABDB10EFA8CC49BAEBFB9FF44710F10051AE911E7391DB789900CBA1
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,5D2E80A5,?,?,?), ref: 005CEFDA
                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 005CF00B
                                                                                  • ReadFile.KERNEL32(?,00000000,00010000,?,00000000,00010000), ref: 005CF096
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005CF162
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleReadSize
                                                                                  • String ID:
                                                                                  • API String ID: 3919263394-0
                                                                                  • Opcode ID: 164c7a8c8b2381430ecc522b549adcfba60a3bf3dcc2e69877afaa65cb4daa75
                                                                                  • Instruction ID: 7e8b5218743a21149409628c8c359434fd1cf2477cd25bb937331ad9fc42965f
                                                                                  • Opcode Fuzzy Hash: 164c7a8c8b2381430ecc522b549adcfba60a3bf3dcc2e69877afaa65cb4daa75
                                                                                  • Instruction Fuzzy Hash: 3351CD71900219DEEB208FA5CC85BEEBFB5FF51710F2481ADE549A7282DB741A89CF50
                                                                                  APIs
                                                                                  • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?,5D2E80A5,00000000,006349E0,?,?,?,?,?,?,?,0061A86D), ref: 005A167A
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,0061A86D,000000FF), ref: 005A1692
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,0061A86D,000000FF), ref: 005A171F
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,0061A86D,000000FF), ref: 005A174E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$Open
                                                                                  • String ID:
                                                                                  • API String ID: 2976201327-0
                                                                                  • Opcode ID: 1f77758760bfbf184e1ef882cdfc5a61a848c48a876224c393d666760cf0991a
                                                                                  • Instruction ID: 30d5967e98cea552945cbff09ec9a1d78e13f3dd9398347e4b2b7334e2d51e39
                                                                                  • Opcode Fuzzy Hash: 1f77758760bfbf184e1ef882cdfc5a61a848c48a876224c393d666760cf0991a
                                                                                  • Instruction Fuzzy Hash: 6F4115B1901619ABEB20CFA5CD88BEFBFF9FF09350F104119E915A7280D7749A04CBA4
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?), ref: 005CDDE2
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • SetWindowTextW.USER32(?,00000010), ref: 005CDE2A
                                                                                  • IsWindow.USER32(00000406), ref: 005CDEB6
                                                                                  • EndDialog.USER32(00000406,00000001), ref: 005CDEE6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$DialogHeapMessageProcessSendText
                                                                                  • String ID:
                                                                                  • API String ID: 3967821603-0
                                                                                  • Opcode ID: f77b355c1d1e79cab08b3fe29d1816982085017774dd70ef553cbe78e3f0dff9
                                                                                  • Instruction ID: 40f0f410dbedca4036d144c30defbc00f81351ca2f7ac537d7976b387b19743f
                                                                                  • Opcode Fuzzy Hash: f77b355c1d1e79cab08b3fe29d1816982085017774dd70ef553cbe78e3f0dff9
                                                                                  • Instruction Fuzzy Hash: AB418831600611EFCB10DF68DC48B5ABBB9FF48720F04426AED14EB2A0DB70AD01DBA0
                                                                                  APIs
                                                                                    • Part of subcall function 005D9F10: SetFilePointer.KERNEL32(?,00000000,?,00000001,5D2E80A5,?,?,?,00615130,000000FF), ref: 005D9F45
                                                                                    • Part of subcall function 005D9F10: GetLastError.KERNEL32(?,00000000,?,00000001,5D2E80A5,?,?,?,00615130,000000FF), ref: 005D9F52
                                                                                  • GetLastError.KERNEL32 ref: 005E1A67
                                                                                    • Part of subcall function 005D9FB0: SetFilePointer.KERNEL32(?,?,?,?,5D2E80A5,?,?,?,?,?,Function_00095600,000000FF), ref: 005D9FEA
                                                                                    • Part of subcall function 005D9FB0: GetLastError.KERNEL32(?,?,?,?,5D2E80A5,?,?,?,?,?,Function_00095600,000000FF), ref: 005D9FF7
                                                                                    • Part of subcall function 005D9FB0: SetLastError.KERNEL32(00000000,?,?,?,?,5D2E80A5,?,?,?,?,?,Function_00095600,000000FF), ref: 005DA00E
                                                                                  • SetEndOfFile.KERNEL32(?), ref: 005E1A16
                                                                                  • GetLastError.KERNEL32 ref: 005E1A29
                                                                                  • SetLastError.KERNEL32(00000000), ref: 005E1A4E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$File$Pointer
                                                                                  • String ID:
                                                                                  • API String ID: 4162258135-0
                                                                                  • Opcode ID: 4623bdf47be3f324e5f4ee245b0b1a864ccb5d83cce0f2d46141cfb79119b5d1
                                                                                  • Instruction ID: df410f8edb7e8afadab921d2832bdac87006f43997e0df9bcd12062a76b4be78
                                                                                  • Opcode Fuzzy Hash: 4623bdf47be3f324e5f4ee245b0b1a864ccb5d83cce0f2d46141cfb79119b5d1
                                                                                  • Instruction Fuzzy Hash: 412122327066469B8720DF6AAC04ABBBB99FF91355F04413BFC80C6210E730CD59C6E5
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005F0C4F
                                                                                  • GetLastError.KERNEL32 ref: 005F0C5A
                                                                                  • ReleaseSemaphore.KERNEL32(?,00000001,00000000), ref: 005F0CC4
                                                                                  • GetLastError.KERNEL32 ref: 005F0CCE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$ObjectReleaseSemaphoreSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 1636903514-0
                                                                                  • Opcode ID: af33a5ddb82b52294fb69ce14a9860733d070e9a594e3c6022186eee32a23764
                                                                                  • Instruction ID: 11635e7bbf726a5ca979ae46d0400d666e6dca4f7d80f5e1c3cf7e64c461730f
                                                                                  • Opcode Fuzzy Hash: af33a5ddb82b52294fb69ce14a9860733d070e9a594e3c6022186eee32a23764
                                                                                  • Instruction Fuzzy Hash: 7F21F3322047058BD7308B29D844B67FBE6BF90324F289B1EE3A6865E2D775DC45C750
                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 005F3275
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005F327F
                                                                                    • Part of subcall function 00589520: std::_Lockit::_Lockit.LIBCPMT ref: 00589550
                                                                                    • Part of subcall function 00589520: std::_Lockit::~_Lockit.LIBCPMT ref: 00589578
                                                                                  • std::_Facet_Register.LIBCPMT ref: 005F32D0
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005F32F0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 088e81db22046b8c18564a4ba14c43d33a8c45693bf5f883581462f4e7cc9b12
                                                                                  • Instruction ID: 8ffdc0e96ff38ce6b73f8353ba3baffd928a092caf6ea46dff3cf1d9f90a0964
                                                                                  • Opcode Fuzzy Hash: 088e81db22046b8c18564a4ba14c43d33a8c45693bf5f883581462f4e7cc9b12
                                                                                  • Instruction Fuzzy Hash: 7A21A139A0061A8FDB05EF58D855A7E7FA6BFC5310F155019EA01AB361CF74DE05CB90
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,?,5D2E80A5,?,?,?,00615130,000000FF), ref: 005CCC67
                                                                                  • GetExitCodeThread.KERNEL32(?,?,?,?,?,00615130,000000FF), ref: 005CCC81
                                                                                  • TerminateThread.KERNEL32(?,00000000,?,?,?,00615130,000000FF), ref: 005CCC99
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00615130,000000FF), ref: 005CCCA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CloseCodeExitHandleObjectSingleTerminateWait
                                                                                  • String ID:
                                                                                  • API String ID: 3774109050-0
                                                                                  • Opcode ID: 0682f8a1fe0351c80883ad9c2b4e5651f372590803508e4496daa9e5752d0658
                                                                                  • Instruction ID: 6a825b34e55db2d2c50adac55ddf5d4874fa8c614863db2a186c7581ef49c0d2
                                                                                  • Opcode Fuzzy Hash: 0682f8a1fe0351c80883ad9c2b4e5651f372590803508e4496daa9e5752d0658
                                                                                  • Instruction Fuzzy Hash: F411AC71504A09EFD7208F54CC09FAABFE9FB04B10F00462EF82A926A0D7B1A944CB90
                                                                                  APIs
                                                                                  • IsWindow.USER32(?), ref: 005CCFBD
                                                                                  • DestroyWindow.USER32(?), ref: 005CCFCA
                                                                                  • IsWindow.USER32(?), ref: 005CD024
                                                                                  • SendMessageW.USER32(?,00000407,00000000,?), ref: 005CD03D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$DestroyMessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 746073012-0
                                                                                  • Opcode ID: 26a69c9cf050ed9d1362dab52e33a557505aa0540a77fb7f616862d934f5f687
                                                                                  • Instruction ID: fa0c6757b1a2e0f2ce06256b7ac83871abd319fa14fbe2ea58eee7045d9406a7
                                                                                  • Opcode Fuzzy Hash: 26a69c9cf050ed9d1362dab52e33a557505aa0540a77fb7f616862d934f5f687
                                                                                  • Instruction Fuzzy Hash: EA110F30509301AFD360DF69C888B5ABBE1FF89710F50592EF89AD2260E375E985DB52
                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 005F268B
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005F2696
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005F2704
                                                                                    • Part of subcall function 005F27E7: std::locale::_Locimp::_Locimp.LIBCPMT ref: 005F27FF
                                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 005F26B1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                                  • String ID:
                                                                                  • API String ID: 677527491-0
                                                                                  • Opcode ID: 8ad76eee28d645468a837381b2e4a6fb74e7ef7428b08cfaa8251523fb443b14
                                                                                  • Instruction ID: c67086a5323bf05aa5fc5c5c6ec1ade9db149accd52c5beb136b399810430656
                                                                                  • Opcode Fuzzy Hash: 8ad76eee28d645468a837381b2e4a6fb74e7ef7428b08cfaa8251523fb443b14
                                                                                  • Instruction Fuzzy Hash: 4E019EB5A006298BC705FF20D859A7C3FA6FFC1350F140008EA015B381DB386A42CB92
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,?,5D2E80A5,?,?,?,00615130,000000FF), ref: 005CCD17
                                                                                  • GetExitCodeThread.KERNEL32(?,?,?,?,?,00615130,000000FF), ref: 005CCD31
                                                                                  • TerminateThread.KERNEL32(?,00000000,?,?,?,00615130,000000FF), ref: 005CCD49
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00615130,000000FF), ref: 005CCD52
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CloseCodeExitHandleObjectSingleTerminateWait
                                                                                  • String ID:
                                                                                  • API String ID: 3774109050-0
                                                                                  • Opcode ID: b4d4552521de62ae8b0605ef084d745ef30cb286f2799567436ef1a0ed9ff167
                                                                                  • Instruction ID: 4b0b0b3c20cc2c8b90d348390098d901d6d00e87a6d3a2d64ab23ef0612397f7
                                                                                  • Opcode Fuzzy Hash: b4d4552521de62ae8b0605ef084d745ef30cb286f2799567436ef1a0ed9ff167
                                                                                  • Instruction Fuzzy Hash: 7D014C71508A45EFDB318F54DC09FA6BFF9FB04B20F104A6DF86A926A0D771A944CA50
                                                                                  APIs
                                                                                  • SetEvent.KERNEL32(?), ref: 005F0D62
                                                                                  • GetLastError.KERNEL32 ref: 005F0D6C
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005F0D77
                                                                                  • GetLastError.KERNEL32 ref: 005F0D82
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EventObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3600396749-0
                                                                                  • Opcode ID: b2126b3e4d505ae29bcf439f7a1f09b1326489547537e65f6eb00c1c635033ff
                                                                                  • Instruction ID: 410ba2ded28417d2008bc567de4e025d6c015a92a047ff33e48e3db5dcd71312
                                                                                  • Opcode Fuzzy Hash: b2126b3e4d505ae29bcf439f7a1f09b1326489547537e65f6eb00c1c635033ff
                                                                                  • Instruction Fuzzy Hash: 0F01B5321047059FD7308FA9D884B27BFE6BF90320F189A1DE1A6C71D1C374B8449B60
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 005C4432
                                                                                  • SetWindowTextW.USER32(00000000,00000009), ref: 005C443D
                                                                                  • GetDlgItem.USER32(00000000,0000040B), ref: 005C444E
                                                                                  • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 005C445F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Item$MessageSendTextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2101643998-0
                                                                                  • Opcode ID: 8d1fe8bf58a90baef206abf293b7e722e7559724461fc695876a3c998f728b2d
                                                                                  • Instruction ID: 72113def72dfec436c0da34a2f68a3b474cfeffa5cce025ee65c1f7002699f31
                                                                                  • Opcode Fuzzy Hash: 8d1fe8bf58a90baef206abf293b7e722e7559724461fc695876a3c998f728b2d
                                                                                  • Instruction Fuzzy Hash: 21016D72204A02BBCB159F90EC09E5ABB7AFF48B01B008118F605D2560C730A862DF90
                                                                                  APIs
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0004CE80,?,00000000,?), ref: 005CCD95
                                                                                  • GetLastError.KERNEL32(?,00000000,?), ref: 005CCDA2
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 005CCDB9
                                                                                  • GetExitCodeThread.KERNEL32(?,?), ref: 005CCDC7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CodeCreateErrorExitLastObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 2732711357-0
                                                                                  • Opcode ID: 43fb8e38fb2717956261b7556274b60c7bd7d03f660733481fa50101829c9c76
                                                                                  • Instruction ID: 2b9f5c7e5c349b62d1ea683e478a7b9f62970d2879805fb4eeba9b61c78623ee
                                                                                  • Opcode Fuzzy Hash: 43fb8e38fb2717956261b7556274b60c7bd7d03f660733481fa50101829c9c76
                                                                                  • Instruction Fuzzy Hash: 97F06275508701AFD720DB68EC49F87BFE4BF54711F00452AF889C2290E6309518C6A2
                                                                                  APIs
                                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,006122E5,00000000,00000001,00000000,000000FE,?,0060A30C,000000FE,00000000,00000000), ref: 006133FE
                                                                                  • GetLastError.KERNEL32(?,006122E5,00000000,00000001,00000000,000000FE,?,0060A30C,000000FE,00000000,00000000,000000FE,000000FE,?,0060A8AF,?), ref: 0061340A
                                                                                    • Part of subcall function 006133D0: CloseHandle.KERNEL32(FFFFFFFE,0061341A,?,006122E5,00000000,00000001,00000000,000000FE,?,0060A30C,000000FE,00000000,00000000,000000FE,000000FE), ref: 006133E0
                                                                                  • ___initconout.LIBCMT ref: 0061341A
                                                                                    • Part of subcall function 00613387: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,006133B6,006122D2,000000FE,?,0060A30C,000000FE,00000000,00000000,000000FE), ref: 0061339A
                                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,006122E5,00000000,00000001,00000000,000000FE,?,0060A30C,000000FE,00000000,00000000,000000FE), ref: 0061342F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                  • String ID:
                                                                                  • API String ID: 2744216297-0
                                                                                  • Opcode ID: a8747cf308f3f44604878fb0f142ea3d564e0d8baeef7987b72c83a49521bf4e
                                                                                  • Instruction ID: bf327455c080e465c1c772618102cbd181d8af402ef6b47c0eebfd3c6821118f
                                                                                  • Opcode Fuzzy Hash: a8747cf308f3f44604878fb0f142ea3d564e0d8baeef7987b72c83a49521bf4e
                                                                                  • Instruction Fuzzy Hash: 78F01C3A100578BBCF225FD1DC09DDA7F67FF093B0F085454FA5A96220CA328960AB94
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005F0B25
                                                                                  • GetLastError.KERNEL32 ref: 005F0B30
                                                                                  • SetEvent.KERNEL32(?), ref: 005F0B4F
                                                                                  • GetLastError.KERNEL32 ref: 005F0B59
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EventObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3600396749-0
                                                                                  • Opcode ID: 4462c313a9107a24e3493f8992d6f9d68d7b641743b5400933fa64453ae60222
                                                                                  • Instruction ID: 4f86f4ad4a4d7fb0ac3f719c331bddc140c1c699046fb68fed0b7063c1fcb0d0
                                                                                  • Opcode Fuzzy Hash: 4462c313a9107a24e3493f8992d6f9d68d7b641743b5400933fa64453ae60222
                                                                                  • Instruction Fuzzy Hash: FCF058315089048FC7216B24EC08E2E7FA2BF95334F286A18E262831F1CB3498429B50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0d$0d
                                                                                  • API String ID: 0-1181051537
                                                                                  • Opcode ID: 58d939fb9cba42649d84a5cea112a252950ad0bd3415f7547a0043f8a08c8031
                                                                                  • Instruction ID: cf7595e0cf5d5fd5abcb50ece5dca55397cad122be3b272d9995c21a9c5d7975
                                                                                  • Opcode Fuzzy Hash: 58d939fb9cba42649d84a5cea112a252950ad0bd3415f7547a0043f8a08c8031
                                                                                  • Instruction Fuzzy Hash: D9B149B2A80205AADB65DFA4CC82FEB77FDAF04700F154659FA15EB1C2E770E9048B54
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • DeleteFileW.KERNEL32(?), ref: 005CB795
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 005CB91D
                                                                                    • Part of subcall function 005A8BF0: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,5D2E80A5,00000000,?), ref: 005A8C34
                                                                                    • Part of subcall function 005A8BF0: ReadFile.KERNEL32(00000000,?,000003FF,00000000,00000000,?,80000000,00000003,00000000,00000003,00000080,00000000,5D2E80A5,00000000), ref: 005A8C77
                                                                                    • Part of subcall function 005A9B20: LoadStringW.USER32(?,?,00000514,5D2E80A5), ref: 005A9B78
                                                                                  Strings
                                                                                  • --verbose --log-file="%s" --remove-pack-file "%s" "%s", xrefs: 005CB738
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Delete$CreateHeapLoadProcessReadString
                                                                                  • String ID: --verbose --log-file="%s" --remove-pack-file "%s" "%s"
                                                                                  • API String ID: 856989409-3685554107
                                                                                  • Opcode ID: 30bd514c0564e1bd5fc14fe87b7244d1b76ff6fb8fe5eca461bd87022d8e4027
                                                                                  • Instruction ID: 624500feaf2c1391cac8d1398acdeba5d37c7aa44d69c0fce096abf4215d78a1
                                                                                  • Opcode Fuzzy Hash: 30bd514c0564e1bd5fc14fe87b7244d1b76ff6fb8fe5eca461bd87022d8e4027
                                                                                  • Instruction Fuzzy Hash: 60B1C131A006059FDB01DFA8C899AADBBB5FF48320F18416DE915EB391DB35AD05CBA1
                                                                                  APIs
                                                                                  • GetSystemDefaultLangID.KERNEL32(5D2E80A5,00000000,?,?,?,5D2E80A5), ref: 005C51B7
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                    • Part of subcall function 005D4DC0: GetLocaleInfoW.KERNEL32(00000000,00000002,006337C0,00000000), ref: 005D4E41
                                                                                    • Part of subcall function 005D4DC0: GetLocaleInfoW.KERNEL32(00000000,00000002,?,-00000001,00000078,-00000001), ref: 005D4E7D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$DefaultHeapLangProcessSystem
                                                                                  • String ID: SystemDefault LangID=$he
                                                                                  • API String ID: 2240978303-1890005533
                                                                                  • Opcode ID: f894fa519c2d7b351a18ad0df783a02f9e719f3dc16a536a6f202c6cbeb9d702
                                                                                  • Instruction ID: 109f02cd4b5633e6ad445978b00312a956ef2a4d2b958d49b98848add6b923d1
                                                                                  • Opcode Fuzzy Hash: f894fa519c2d7b351a18ad0df783a02f9e719f3dc16a536a6f202c6cbeb9d702
                                                                                  • Instruction Fuzzy Hash: 2D71D331A00A568FCB10DFA8C858B6DBBB5FF44320B15465DE921A73D1DB74AD02CB90
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,5D2E80A5,?,80000002,80000002), ref: 005ABB53
                                                                                  • LeaveCriticalSection.KERNEL32(?,5D2E80A5,80000002,00000000,00614F60,000000FF,?,80004005,?,80000002,80000002), ref: 005ABCCF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalFileLeaveModuleNameSection
                                                                                  • String ID: LOG
                                                                                  • API String ID: 1232429956-429402703
                                                                                  • Opcode ID: f68373205078f1e6575dc96c190b888afcc153c941400b6241c65b6d77d480e7
                                                                                  • Instruction ID: 5848446f64ec836d4c44ff99da37a8be23e2958c3bc938ef17974f0b5fb8b0a4
                                                                                  • Opcode Fuzzy Hash: f68373205078f1e6575dc96c190b888afcc153c941400b6241c65b6d77d480e7
                                                                                  • Instruction Fuzzy Hash: EA514431A002499FEB14DF28CC55BAEBBB5FF45310F548569E80ADB382EB759E048BD0
                                                                                  APIs
                                                                                  • PathIsUNCW.SHLWAPI(?,5D2E80A5), ref: 00586A52
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path
                                                                                  • String ID: \\?\$\\?\UNC\
                                                                                  • API String ID: 2875597873-3019864461
                                                                                  • Opcode ID: b2678ce0638df0e8935bdd011778036480daf0ad9c787a2c08dfe72722f84f42
                                                                                  • Instruction ID: 76a21955952be147b47257526ba8dc26e1192edc3989382144543c88bf1d7d87
                                                                                  • Opcode Fuzzy Hash: b2678ce0638df0e8935bdd011778036480daf0ad9c787a2c08dfe72722f84f42
                                                                                  • Instruction Fuzzy Hash: 8E5181B0D00205DBDB14EF68C84ABAEBBF5FF85308F10861DE851B7681DB75A948CB91
                                                                                  APIs
                                                                                  • GetTempPathW.KERNEL32(00000104,80000002,5D2E80A5,?,80000002,00650A68), ref: 005AB97F
                                                                                  • CreateDirectoryW.KERNEL32(80000002,00000000,?,80000002,00650A68), ref: 005AB9E0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryPathTemp
                                                                                  • String ID: ADVINST_LOGS
                                                                                  • API String ID: 2885754953-2492584244
                                                                                  • Opcode ID: ac35a54307cc422536cc1c068975986e998e3d8e77e378b53c94e13def009a87
                                                                                  • Instruction ID: 981c5154703b4ff642857cf9216b5baca67dfef5410a80d9c018bf1867c31c97
                                                                                  • Opcode Fuzzy Hash: ac35a54307cc422536cc1c068975986e998e3d8e77e378b53c94e13def009a87
                                                                                  • Instruction Fuzzy Hash: AA51D175900219CBDB309F28C8447BEBBB4FF15314F2446AEE85697292EB348E81CBD0
                                                                                  APIs
                                                                                  • InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,5D2E80A5,00000000,00000000), ref: 005A29C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalInitializeSection
                                                                                  • String ID: 8Fc
                                                                                  • API String ID: 32694325-2812392795
                                                                                  • Opcode ID: cdac6cc22bbde8cdae6a465b1df293f0a1658eddb76166caf8262a998c432c98
                                                                                  • Instruction ID: 4850e42f33aacdb58130ea670373e40725d84d3a9c66d12173d9c2148fde45ee
                                                                                  • Opcode Fuzzy Hash: cdac6cc22bbde8cdae6a465b1df293f0a1658eddb76166caf8262a998c432c98
                                                                                  • Instruction Fuzzy Hash: 6E51C035A003198BDB24CF14CC55BAEBBB4FF8A710F0486D9D80A67690EB755E84CF91
                                                                                  APIs
                                                                                    • Part of subcall function 005839B0: GetProcessHeap.KERNEL32 ref: 00583A05
                                                                                  • WriteFile.KERNEL32(?,00000005,?,?,00000000,006337E8,00000002,?,00000000,CPU: ,00000005), ref: 005AB201
                                                                                  • FlushFileBuffers.KERNEL32(?), ref: 005AB20A
                                                                                    • Part of subcall function 00585350: FindResourceW.KERNEL32(00000000,?,00000006,00000000,00000000,?,0059E648,-00000010), ref: 00585373
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFindFlushHeapProcessResourceWrite
                                                                                  • String ID: CPU:
                                                                                  • API String ID: 2793600070-1724696780
                                                                                  • Opcode ID: 4e1a5f6c318beb7d49e2f1f26d7df4d796198fc028f49cbc722af37b6f65ce07
                                                                                  • Instruction ID: de3cb244127e45f23d18e14e427e5241cf47d4ff59983c97994abc4bca49681a
                                                                                  • Opcode Fuzzy Hash: 4e1a5f6c318beb7d49e2f1f26d7df4d796198fc028f49cbc722af37b6f65ce07
                                                                                  • Instruction Fuzzy Hash: A341CE31A00A09AFDB00EFA8CC59BAEBBB5FF45720F144619E811A7391DB75AD01CBD0
                                                                                  APIs
                                                                                  • EncodePointer.KERNEL32(00000000,?), ref: 005F895B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodePointer
                                                                                  • String ID: MOC$RCC
                                                                                  • API String ID: 2118026453-2084237596
                                                                                  • Opcode ID: 76cc4caa4605dc0649f677357d6f2135c854411f28a0a2a8741d40fc208a18a1
                                                                                  • Instruction ID: 7d45984fbca2fa60a909c74d80a068ed7d74ee706da627e4563f7a8eb672d68e
                                                                                  • Opcode Fuzzy Hash: 76cc4caa4605dc0649f677357d6f2135c854411f28a0a2a8741d40fc208a18a1
                                                                                  • Instruction Fuzzy Hash: 1541157190020EAFCF16DF94CD85ABEBFB5FF48310F14409AFA08A6265D639AA50DB51
                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005892FB
                                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0058935E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                  • String ID: bad locale name
                                                                                  • API String ID: 3988782225-1405518554
                                                                                  • Opcode ID: 906809070c2089260baf6f2ad410e6cd8b4eaafd04de25a4e9208228202b2281
                                                                                  • Instruction ID: 95e6a35350ba7c37e3be0376daae69aa155c109b804069cb50323c1c0cfb462d
                                                                                  • Opcode Fuzzy Hash: 906809070c2089260baf6f2ad410e6cd8b4eaafd04de25a4e9208228202b2281
                                                                                  • Instruction Fuzzy Hash: 3A21F0B0805784DED321CF68C80479BBFF4EF15714F148A8DD49597B81D3B9A608CBA1
                                                                                  APIs
                                                                                  • InitializeCriticalSectionEx.KERNEL32(00650A3C,00000000,00000000,5D2E80A5,?,0061A3A3,000000FF), ref: 005810A5
                                                                                  • GetLastError.KERNEL32(?,0061A3A3,000000FF), ref: 005810AF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalErrorInitializeLastSection
                                                                                  • String ID: ,e
                                                                                  • API String ID: 3413597225-153164747
                                                                                  • Opcode ID: 33075b71da2713e41b550171e667dc6d2a9cdb5ec1e7458b8ee623a46c7f4cd6
                                                                                  • Instruction ID: 6f51806c4bea2fc1c5f3333c88c13612a687e66cd5174cd4748f93ba52526688
                                                                                  • Opcode Fuzzy Hash: 33075b71da2713e41b550171e667dc6d2a9cdb5ec1e7458b8ee623a46c7f4cd6
                                                                                  • Instruction Fuzzy Hash: B211CBB0A04B85DBFB10CF21ED09B5A7FEAF700715F005258E8109B7A1D7BA9008CF44
                                                                                  APIs
                                                                                    • Part of subcall function 005A0600: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,5D2E80A5,?,Function_00095110,000000FF), ref: 005A0627
                                                                                    • Part of subcall function 005A0600: GetLastError.KERNEL32(?,00000000,00000000,5D2E80A5,?,Function_00095110,000000FF), ref: 005A0631
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,0058160A), ref: 005F1BDE
                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0058160A), ref: 005F1BED
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005F1BE8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 3511171328-631824599
                                                                                  • Opcode ID: 8c1b2d382a83511a96a1000949bcab7344b260167f05315a197933ed8e730e01
                                                                                  • Instruction ID: 58fcef211eceeb5a61cec2088ccda009b43afc19cbffc0c32fd6d587d0b168fa
                                                                                  • Opcode Fuzzy Hash: 8c1b2d382a83511a96a1000949bcab7344b260167f05315a197933ed8e730e01
                                                                                  • Instruction Fuzzy Hash: B4E06D70201B12CFD3309F68E5087967EE5BF81304F00995DE846C6251EBB5D544CBA1
                                                                                  APIs
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005ED0DD
                                                                                  • GetLastError.KERNEL32 ref: 005ED0E7
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 005ED10E
                                                                                  • GetLastError.KERNEL32 ref: 005ED118
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseErrorHandleLast
                                                                                  • String ID:
                                                                                  • API String ID: 918212764-0
                                                                                  • Opcode ID: ab72d5c172bfcb99e8517d1894abd8bffa2571d9eb0520410d8c2910594c7ef5
                                                                                  • Instruction ID: f86398d0bb25f490ff644f9bb84027b5607eca85884ecc5e5f10885c937cf0d2
                                                                                  • Opcode Fuzzy Hash: ab72d5c172bfcb99e8517d1894abd8bffa2571d9eb0520410d8c2910594c7ef5
                                                                                  • Instruction Fuzzy Hash: 3431CAB1904649DFDB28DF69D948B5ABFB8FF04750F204259E850AB280E775AA05CBA0
                                                                                  APIs
                                                                                  • CloseHandle.KERNEL32(00000001,5D2E80A5), ref: 005E46E9
                                                                                  • GetLastError.KERNEL32 ref: 005E46F3
                                                                                  • CloseHandle.KERNEL32(00000001,5D2E80A5), ref: 005E4714
                                                                                  • GetLastError.KERNEL32 ref: 005E471E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2189925890.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                                                  • Associated: 00000004.00000002.2189908305.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190195725.0000000000627000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190237727.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000656000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.2190332753.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_580000_aipackagechainer.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseErrorHandleLast
                                                                                  • String ID:
                                                                                  • API String ID: 918212764-0
                                                                                  • Opcode ID: 161b74e72d8234a8ed5343d9bdc971c4e78dcb07371f5dffc78a660c7adb159f
                                                                                  • Instruction ID: 878e2651e8d77cb931f0ca8784ba592a61ad81d31091112fe3651b37ff6f4ae1
                                                                                  • Opcode Fuzzy Hash: 161b74e72d8234a8ed5343d9bdc971c4e78dcb07371f5dffc78a660c7adb159f
                                                                                  • Instruction Fuzzy Hash: 1A21DEB1A05684DBCB20CF69D948F6BBFF8FF02B50F144599E884A7280D771A9058BA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2310969265.0000000007A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_7a10000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: @}Fl
                                                                                  • API String ID: 0-73316818
                                                                                  • Opcode ID: e172c38b60df96498942fcc64f7faacc1529e12bda7022556b86ccdfead3d9d4
                                                                                  • Instruction ID: a6812a5d39e7eb2457f06a8f15085d789db2db55bdb914971b9efd1ff134ddf3
                                                                                  • Opcode Fuzzy Hash: e172c38b60df96498942fcc64f7faacc1529e12bda7022556b86ccdfead3d9d4
                                                                                  • Instruction Fuzzy Hash: 27E0E51425E3D01FD31793B89825AAA7FB15F8359070A58EBE584CF9ABC94C5C4983A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2252743812.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a60000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 265c80ba19c21fad8d6100e6f1f5268562c22108fb961ea3a2c53ba80bd83802
                                                                                  • Instruction ID: 0ccf014461c5592cbcaf5cc6e2eac2ccd7492b76a14a71b21780ba614a0e69c4
                                                                                  • Opcode Fuzzy Hash: 265c80ba19c21fad8d6100e6f1f5268562c22108fb961ea3a2c53ba80bd83802
                                                                                  • Instruction Fuzzy Hash: 43915875A00205CFCB15DF59C494AAEFBB1FF88310B2486A9D916AB365C735FC51CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2252743812.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a60000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 80cf173a85beb423df45659c9ac6e0fcb80d40509b1cb1965c9a47e8024ab8bf
                                                                                  • Instruction ID: 9b69cf551d5e598c6605ca93151d4ae3f2f8b08c2c6c30768decb248ef4fd0a0
                                                                                  • Opcode Fuzzy Hash: 80cf173a85beb423df45659c9ac6e0fcb80d40509b1cb1965c9a47e8024ab8bf
                                                                                  • Instruction Fuzzy Hash: 88512730B00224CFEB159B78C855B6D77B6BF89248F2441A8D10ADB3A0EF35AD85CF60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2252743812.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a60000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 65fb2b4467a791d317d6961127449424fbbe9dcde6b5151aa4f671980ce45c9f
                                                                                  • Instruction ID: 992a74db343e2b56666279221121a9a332de459793bd04490ebcea802895c88d
                                                                                  • Opcode Fuzzy Hash: 65fb2b4467a791d317d6961127449424fbbe9dcde6b5151aa4f671980ce45c9f
                                                                                  • Instruction Fuzzy Hash: B231FE74A0121ACFEB29DF68CD90F9DB7B1BF84204F1042E9D108AB391DA749E85CF90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2250429184.000000000324D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0324D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_324d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f28a48fd640470baa7fd14bab1707bcf7e81ddb1f7d1c50999a624a97006ad15
                                                                                  • Instruction ID: 1f28ec283016cb196d170028dff217cb5d425bb2817d4963d36415dddb5caee1
                                                                                  • Opcode Fuzzy Hash: f28a48fd640470baa7fd14bab1707bcf7e81ddb1f7d1c50999a624a97006ad15
                                                                                  • Instruction Fuzzy Hash: 0201527244D3C09FE7168B258D94752BFA8DF43224F1D85DBE9848F1A3C2695C45C772
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2250429184.000000000324D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0324D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_324d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e1456193f6e6059ced5fe356d4ee25215586713f0ff3786269deeceb9cd12fd0
                                                                                  • Instruction ID: ca95edd2b82ac55746ee36b2d038ff5abdfd74b2bd36225d34c9989258c9624c
                                                                                  • Opcode Fuzzy Hash: e1456193f6e6059ced5fe356d4ee25215586713f0ff3786269deeceb9cd12fd0
                                                                                  • Instruction Fuzzy Hash: 3501F272418340EAE718CA25CD80B66FF98DF41764F0CD15AED080B243C6B89881C6B1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ^6k
                                                                                  • API String ID: 0-3391091469
                                                                                  • Opcode ID: 671b3e96c1288f62e8760d780d16efbaf25625bd0b2a817baee58b4a024edb39
                                                                                  • Instruction ID: 3fca2285ccab1be0e6d57b7caa39ad8b3bcbaecc332a3f7f32f3851e384af4e4
                                                                                  • Opcode Fuzzy Hash: 671b3e96c1288f62e8760d780d16efbaf25625bd0b2a817baee58b4a024edb39
                                                                                  • Instruction Fuzzy Hash: 41C1807190A3A09FD707EB38D8616997FF5AF47214B1A00DBC081CF1A3EA348D49CB65
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: W
                                                                                  • API String ID: 0-655174618
                                                                                  • Opcode ID: 38dc9e8609a1122960e1426a10be74e31b0ee9a2f51d18db57f2b6e4bc70bd7c
                                                                                  • Instruction ID: f586d26b7b8a7225607b193091cbc84c60b1cf1b6b5e2e0c8ae3fc0dd2fbdc78
                                                                                  • Opcode Fuzzy Hash: 38dc9e8609a1122960e1426a10be74e31b0ee9a2f51d18db57f2b6e4bc70bd7c
                                                                                  • Instruction Fuzzy Hash: E3A19C74A05605CFCB06CFADC494AAEFBB1FF49310B2886A9C515AB3A5C735EC51CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f6a0bb30a758551303729308a446b4ef9756c37c9928dee069f68fa033686d4e
                                                                                  • Instruction ID: 0da462b11ba9cdd7090a1e6e8a0b94c8c2613b04dd4115ed25c4ae31ebb9b3be
                                                                                  • Opcode Fuzzy Hash: f6a0bb30a758551303729308a446b4ef9756c37c9928dee069f68fa033686d4e
                                                                                  • Instruction Fuzzy Hash: 69A19234A05644DFCB05CFA8D884AAEBBF6FF89710F1884A9E405AB361C735ED46CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1958fa4a751920580313cf3e4399bbd9a203c7465e4245db887c7b9c405710f0
                                                                                  • Instruction ID: fa132d29d9a27581421901eb287c5516dcc549ceddbed71270066fd132743a94
                                                                                  • Opcode Fuzzy Hash: 1958fa4a751920580313cf3e4399bbd9a203c7465e4245db887c7b9c405710f0
                                                                                  • Instruction Fuzzy Hash: 3831BC74E097559FCB01DFACD8908AABFB0FF4A300B05819AD446DB362D630ED46CBA5
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9663ac30b1d7e1d7cfbec5011c673e2c38a2521859b45053c9bfdcc90b619deb
                                                                                  • Instruction ID: ab4e3d709e53931330588c5692156bcc701f27247b066c211f28d04f7b5a3641
                                                                                  • Opcode Fuzzy Hash: 9663ac30b1d7e1d7cfbec5011c673e2c38a2521859b45053c9bfdcc90b619deb
                                                                                  • Instruction Fuzzy Hash: 1D31FC70A0111ACFEB69DF69DD50F9DBBB2BF84204F1045E9D108AB391DA349E85CF90
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 08c408c3bc3d6c7f4d58efa7f5abe271478623b398baeb956319bc905bbbfb8d
                                                                                  • Instruction ID: b1bc5f8e8c66a347f2747fd30c3a9d0e1f361b3455655d448912cb59934f0e84
                                                                                  • Opcode Fuzzy Hash: 08c408c3bc3d6c7f4d58efa7f5abe271478623b398baeb956319bc905bbbfb8d
                                                                                  • Instruction Fuzzy Hash: 7D11B274E016099FCB00DF9CD9809AEBBB5FF88310B1585A9E909AB351C731ED41CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2242674755.0000000002F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F9D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_2f9d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8b264836da7d05c4a955217a278a1efa8c195ae72bb239bbb2f0ccde7231ffb7
                                                                                  • Instruction ID: d91ad4c470f5e84eddec890d24468b0ff960c8a7e8bfa9a30f8ee2ba27ad5dba
                                                                                  • Opcode Fuzzy Hash: 8b264836da7d05c4a955217a278a1efa8c195ae72bb239bbb2f0ccde7231ffb7
                                                                                  • Instruction Fuzzy Hash: DD012B72904344DAFB105E25CD84B67FFD8DF41BA4F28C11ADF084B16AC7B99441C6B1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2242674755.0000000002F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F9D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_2f9d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2a0bfefd94a6336a446b2e6e840d8a918c7227caab8e512a6e959dcfca509a4f
                                                                                  • Instruction ID: 9f599f6f089be2569ef0313a78da0b87fb1ca4f4e345838ba7138fc40fc92ba5
                                                                                  • Opcode Fuzzy Hash: 2a0bfefd94a6336a446b2e6e840d8a918c7227caab8e512a6e959dcfca509a4f
                                                                                  • Instruction Fuzzy Hash: FF014C7240E3C09FE7128B258894B52BFB4DF43624F1980DBD9888F1A7C2699849C772
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: q$q$q$q
                                                                                  • API String ID: 0-594874556
                                                                                  • Opcode ID: 0007fd3a86259f83689803dc5d61879ebae4520c35fce6bb2e15819403bc1841
                                                                                  • Instruction ID: cea0e0b569824a237e8916ef06f13a47e449e90d84bfdc8bc2079f2efcbe2de8
                                                                                  • Opcode Fuzzy Hash: 0007fd3a86259f83689803dc5d61879ebae4520c35fce6bb2e15819403bc1841
                                                                                  • Instruction Fuzzy Hash: 27115E6190E7D2AFD307A73898651D87FB4AF23254B4900D7C894CB1E3E658982EC3A6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000B.00000002.2244269968.00000000030A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_11_2_30a0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: q$q$q$q
                                                                                  • API String ID: 0-594874556
                                                                                  • Opcode ID: 5b9a71ebfa174d21f11951c4192840a29a1c7444e929543396d2aa9c68caefef
                                                                                  • Instruction ID: 88de82b9305803ee7fc1c99e9f364033aa6b29e41f3148b147f3f47a5a79b191
                                                                                  • Opcode Fuzzy Hash: 5b9a71ebfa174d21f11951c4192840a29a1c7444e929543396d2aa9c68caefef
                                                                                  • Instruction Fuzzy Hash: D8F08961E0D6C2BFE316477894252D87BA0AF37310F4801DBCC64CB5D2F55C5425C296

                                                                                  Execution Graph

                                                                                  Execution Coverage:3.4%
                                                                                  Dynamic/Decrypted Code Coverage:11.3%
                                                                                  Signature Coverage:0.2%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:61
                                                                                  execution_graph 116484 2da18d 116485 318fa3 116484->116485 116486 2da1b3 116484->116486 116489 319063 116485->116489 116494 319007 116485->116494 116497 319027 116485->116497 116487 2da2fd 116486->116487 116490 2f042b 21 API calls 116486->116490 116491 2f045b 21 API calls 116487->116491 116542 344358 81 API calls __wsopen_s 116489->116542 116496 2da1dd 116490->116496 116501 2da334 __fread_nolock 116491->116501 116492 31905e 116540 2d914c 93 API calls 116494->116540 116498 2f042b 21 API calls 116496->116498 116496->116501 116497->116492 116541 344358 81 API calls __wsopen_s 116497->116541 116499 2da22b 116498->116499 116499->116494 116502 2da266 116499->116502 116500 2f045b 21 API calls 116500->116501 116501->116497 116501->116500 116502->116492 116502->116501 116503 319086 116502->116503 116504 2da2c7 116502->116504 116506 2d9976 116502->116506 116543 344358 81 API calls __wsopen_s 116503->116543 116504->116487 116504->116506 116507 2f042b 21 API calls 116506->116507 116508 2d99d9 116507->116508 116524 2d1e4e 116508->116524 116511 2f042b 21 API calls 116516 2d9abe ISource 116511->116516 116515 31955a 116545 33010c 21 API calls ISource 116515->116545 116516->116515 116518 319575 116516->116518 116519 2dfbc8 21 API calls 116516->116519 116520 2d1dd1 21 API calls 116516->116520 116521 2d9d61 ISource 116516->116521 116544 2d3574 21 API calls 116516->116544 116519->116516 116520->116516 116522 2d9dfc ISource 116521->116522 116531 2d1dd1 116521->116531 116523 2d9e13 116522->116523 116539 2d24c6 21 API calls ISource 116522->116539 116528 2d1e5e 116524->116528 116525 2d1e66 116525->116511 116526 2f042b 21 API calls 116526->116528 116527 2df38f 21 API calls 116527->116528 116528->116525 116528->116526 116528->116527 116529 2dfbc8 21 API calls 116528->116529 116530 2d1e4e 21 API calls 116528->116530 116529->116528 116530->116528 116532 2d1ddf 116531->116532 116537 2d1e07 ISource 116531->116537 116533 2d1ded 116532->116533 116534 2d1dd1 21 API calls 116532->116534 116535 2d1df3 116533->116535 116536 2d1dd1 21 API calls 116533->116536 116534->116533 116535->116537 116546 2d3490 21 API calls ISource 116535->116546 116536->116535 116537->116522 116539->116522 116540->116497 116541->116492 116542->116492 116543->116492 116544->116516 116545->116518 116546->116537 114988 3196f0 114989 3196fb 114988->114989 115027 2da791 ISource 114988->115027 114989->114989 114991 2daa25 timeGetTime 114991->115027 114992 2dab8d Sleep 114995 2dab9e 114992->114995 115005 2daba9 114992->115005 114994 31a622 Sleep 114998 31a633 114994->114998 114999 31a63e 114994->114999 115132 2efb90 timeGetTime 114995->115132 114996 31986e timeGetTime 115133 2d362b 22 API calls 114996->115133 115152 2efb90 timeGetTime 114998->115152 115001 31a689 114999->115001 115043 2da9d3 ISource 114999->115043 115153 33e2ab 45 API calls 114999->115153 115011 31a6b9 GetExitCodeProcess 115001->115011 115017 31a6ff 115001->115017 115001->115043 115003 319a6e Sleep 115003->115043 115009 31a501 115005->115009 115010 31a50a 115005->115010 115019 2dac34 115005->115019 115022 31a508 115005->115022 115005->115043 115148 3632dd GetForegroundWindow 115009->115148 115149 3632dd GetForegroundWindow 115010->115149 115013 31a6e5 CloseHandle 115011->115013 115014 31a6cf WaitForSingleObject 115011->115014 115013->115017 115014->115013 115014->115043 115018 31a740 Sleep 115017->115018 115018->115043 115019->115043 115021 31a5f5 115151 33f7f5 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 115021->115151 115022->115019 115022->115021 115022->115043 115150 3304cb 21 API calls 115022->115150 115025 31991a 115137 2dfa3b 115025->115137 115027->114991 115027->114992 115027->114994 115027->114996 115027->115003 115027->115025 115033 2daad7 115027->115033 115036 31971d TranslateAcceleratorW 115027->115036 115042 2dab6f TranslateMessage DispatchMessageW 115027->115042 115027->115043 115050 2d7d70 115027->115050 115057 2d7ff0 115027->115057 115078 2d8e00 115027->115078 115107 2e59e7 115027->115107 115112 2f045b 115027->115112 115122 2f042b 115027->115122 115134 344636 21 API calls 115027->115134 115135 3634d5 21 API calls 115027->115135 115136 2d362b 22 API calls 115027->115136 115147 344358 81 API calls __wsopen_s 115033->115147 115035 31996b 115038 2dfa3b 21 API calls 115035->115038 115036->115027 115037 319736 115036->115037 115040 3199ad 115038->115040 115144 2d21b0 39 API calls 115040->115144 115042->115027 115044 3199c9 115045 2dfa3b 21 API calls 115044->115045 115046 319a0b 115045->115046 115145 2d21b0 39 API calls 115046->115145 115048 319a27 115146 344636 21 API calls 115048->115146 115051 2d7d8f 115050->115051 115052 2d7da3 115050->115052 115154 2d7870 93 API calls 2 library calls 115051->115154 115155 344358 81 API calls __wsopen_s 115052->115155 115054 2d7d9a 115054->115027 115056 317c61 115056->115056 115058 2d8030 115057->115058 115075 2d80fc ISource 115058->115075 115165 2f0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 115058->115165 115061 317cb6 115061->115075 115166 2df38f 115061->115166 115062 2df38f 21 API calls 115062->115075 115068 317cda 115172 2f080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 115068->115172 115073 2d2510 21 API calls 115073->115075 115074 2d8401 115074->115027 115075->115062 115075->115073 115075->115074 115076 344358 81 API calls 115075->115076 115156 2dfbc8 115075->115156 115160 2d1d83 115075->115160 115164 2d6394 92 API calls 115075->115164 115173 2f0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 115075->115173 115174 2f06d4 28 API calls __onexit 115075->115174 115175 2f080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 115075->115175 115176 357497 93 API calls 115075->115176 115076->115075 115079 2d908a 115078->115079 115080 2d8e62 115078->115080 115227 2f0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 115079->115227 115081 2d8e6e 115080->115081 115082 318b44 115080->115082 115178 2e5eb0 115081->115178 115229 357c74 165 API calls 115082->115229 115086 2d9094 115086->115080 115088 2dfa3b 21 API calls 115086->115088 115093 2d90b2 115088->115093 115090 2d8e9f 115091 2e5eb0 9 API calls 115090->115091 115102 2d903a 115090->115102 115092 2d8eb3 115091->115092 115094 318b54 115092->115094 115096 2e5eb0 9 API calls 115092->115096 115228 2f080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 115093->115228 115094->115102 115230 344358 81 API calls __wsopen_s 115094->115230 115098 2d8ecc 115096->115098 115098->115094 115099 2d8f5d 115098->115099 115100 2e5eb0 9 API calls 115099->115100 115101 2d8f70 115100->115101 115201 34fc5b 115101->115201 115208 2dc263 115101->115208 115102->115027 115103 2d8f8c ISource 115103->115102 115226 2d29d0 21 API calls ISource 115103->115226 115108 2e5a2b 115107->115108 115110 2e59f9 115107->115110 115108->115027 115109 2e5a1e IsDialogMessageW 115109->115108 115109->115110 115110->115108 115110->115109 115111 329c70 GetClassLongW 115110->115111 115111->115109 115111->115110 115116 2f042b 115112->115116 115114 2f044a 115114->115027 115116->115114 115118 2f044c 115116->115118 115420 2fe8ac 115116->115420 115427 2f4dd8 7 API calls 2 library calls 115116->115427 115117 2f0c79 115429 2f440c RaiseException 115117->115429 115118->115117 115428 2f440c RaiseException 115118->115428 115120 2f0c96 115120->115027 115125 2f0430 115122->115125 115123 2fe8ac ___std_exception_copy 20 API calls 115123->115125 115124 2f044a 115124->115027 115125->115123 115125->115124 115128 2f044c 115125->115128 115432 2f4dd8 7 API calls 2 library calls 115125->115432 115127 2f0c79 115434 2f440c RaiseException 115127->115434 115128->115127 115433 2f440c RaiseException 115128->115433 115130 2f0c96 115130->115027 115132->115005 115133->115027 115134->115027 115135->115027 115136->115027 115138 2dfa4a _wcslen 115137->115138 115139 2f045b 21 API calls 115138->115139 115140 2dfa72 __fread_nolock 115139->115140 115141 2f042b 21 API calls 115140->115141 115142 2dfa88 115141->115142 115143 2d21b0 39 API calls 115142->115143 115143->115035 115144->115044 115145->115048 115146->115043 115147->115043 115148->115022 115149->115022 115150->115021 115151->115019 115152->114999 115153->115001 115154->115054 115155->115056 115157 2dfbdc 115156->115157 115159 2dfbeb __fread_nolock 115156->115159 115158 2f045b 21 API calls 115157->115158 115157->115159 115158->115159 115159->115075 115161 2d1d8e 115160->115161 115162 2d1dbd 115161->115162 115177 2d21b0 39 API calls 115161->115177 115162->115075 115164->115075 115165->115061 115167 2f045b 21 API calls 115166->115167 115168 2df3a4 115167->115168 115169 2f042b 21 API calls 115168->115169 115170 2df3b2 115169->115170 115171 2f06d4 28 API calls __onexit 115170->115171 115171->115068 115172->115075 115173->115075 115174->115075 115175->115075 115176->115075 115177->115162 115179 2e5edd 115178->115179 115180 2d8e7a 115178->115180 115231 2f0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 115179->115231 115184 2d8c60 115180->115184 115182 2e5ee7 115182->115180 115232 2f080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 115182->115232 115185 318a9a 115184->115185 115188 2d8c8c 115184->115188 115186 318aab 115185->115186 115234 344358 81 API calls __wsopen_s 115185->115234 115186->115090 115189 318abf 115188->115189 115196 2d8cca __fread_nolock 115188->115196 115235 344358 81 API calls __wsopen_s 115189->115235 115192 2f042b 21 API calls 115192->115196 115193 2f045b 21 API calls 115193->115196 115194 318b03 115236 2d914c 93 API calls 115194->115236 115196->115192 115196->115193 115196->115194 115197 318b19 115196->115197 115198 2d8dac 115196->115198 115199 2d8d99 115196->115199 115197->115198 115237 344358 81 API calls __wsopen_s 115197->115237 115198->115090 115199->115198 115233 35630a 53 API calls _wcslen 115199->115233 115238 2d304c 115201->115238 115205 34fca5 115207 34fcce 115205->115207 115289 2d32c3 115205->115289 115207->115103 115210 2dc296 115208->115210 115225 2dc333 115208->115225 115209 2dc2a6 115212 2dc2b9 115209->115212 115213 2d334c 38 API calls 115209->115213 115210->115209 115378 2d334c 115210->115378 115214 2dc2cc 115212->115214 115215 2d334c 38 API calls 115212->115215 115213->115212 115216 2dc2df 115214->115216 115218 2d334c 38 API calls 115214->115218 115215->115214 115217 2dc2f2 115216->115217 115219 2d334c 38 API calls 115216->115219 115220 2dc305 115217->115220 115221 2d334c 38 API calls 115217->115221 115218->115216 115219->115217 115222 2d304c 52 API calls 115220->115222 115221->115220 115223 2dc314 115222->115223 115350 2e51fb 115223->115350 115225->115103 115226->115103 115227->115086 115228->115080 115229->115094 115230->115102 115231->115182 115232->115180 115233->115198 115234->115186 115235->115198 115236->115197 115237->115198 115239 2d3063 115238->115239 115255 2d305e 115238->115255 115240 2d3099 115239->115240 115241 2d306b 115239->115241 115245 2d30ab 115240->115245 115251 312e83 115240->115251 115252 312d8c 115240->115252 115303 2f50f1 25 API calls 115241->115303 115243 2d307b 115248 2f042b 21 API calls 115243->115248 115304 2f016e 50 API calls 115245->115304 115246 312e9b 115246->115246 115250 2d3085 115248->115250 115253 2dfa3b 21 API calls 115250->115253 115306 2f50ae 25 API calls 115251->115306 115254 2f045b 21 API calls 115252->115254 115260 312e05 115252->115260 115253->115255 115256 312dd5 115254->115256 115261 2dfe70 115255->115261 115257 2f042b 21 API calls 115256->115257 115258 312dfc 115257->115258 115259 2dfa3b 21 API calls 115258->115259 115259->115260 115305 2f016e 50 API calls 115260->115305 115307 2df6d1 115261->115307 115263 2e00bb 115320 2e1323 21 API calls __fread_nolock 115263->115320 115266 2e00d5 115266->115205 115268 326467 115277 2f042b 21 API calls 115268->115277 115269 32664c 115324 33a4b0 83 API calls __wsopen_s 115269->115324 115270 2e04cd 115270->115266 115326 33a4b0 83 API calls __wsopen_s 115270->115326 115273 2e1323 21 API calls 115288 2dfe95 __fread_nolock 115273->115288 115275 2df9fa 21 API calls 115275->115288 115276 32665a 115325 2e1323 21 API calls __fread_nolock 115276->115325 115279 32653d 115277->115279 115281 2f045b 21 API calls 115279->115281 115280 326670 115280->115266 115285 32657a __fread_nolock 115281->115285 115284 2e0089 CharUpperBuffW 115319 2e146a 21 API calls 115284->115319 115285->115269 115285->115270 115287 2f045b 21 API calls 115287->115288 115288->115263 115288->115268 115288->115269 115288->115270 115288->115273 115288->115275 115288->115285 115288->115287 115312 2e20c0 40 API calls _wcslen 115288->115312 115313 2dfaa1 115288->115313 115321 2dfcc7 22 API calls __fread_nolock 115288->115321 115322 2df5c0 21 API calls __fread_nolock 115288->115322 115323 2e146a 21 API calls 115288->115323 115290 31304d 115289->115290 115291 2d32d3 115289->115291 115292 31305e 115290->115292 115327 2df82c 115290->115327 115296 2f042b 21 API calls 115291->115296 115339 2df9fa 115292->115339 115295 313068 115295->115295 115297 2d32e6 115296->115297 115298 2d32ef 115297->115298 115299 2d3301 115297->115299 115300 2dfa3b 21 API calls 115298->115300 115301 2df38f 21 API calls 115299->115301 115302 2d32f7 115300->115302 115301->115302 115302->115207 115303->115243 115304->115243 115305->115251 115306->115246 115308 2f045b 21 API calls 115307->115308 115309 2df6f6 115308->115309 115310 2f042b 21 API calls 115309->115310 115311 2df704 115310->115311 115311->115288 115312->115288 115314 2dfab4 115313->115314 115315 2dfab1 __fread_nolock 115313->115315 115316 2f042b 21 API calls 115314->115316 115315->115284 115317 2dfabf 115316->115317 115318 2f045b 21 API calls 115317->115318 115318->115315 115319->115288 115320->115266 115321->115288 115322->115288 115323->115288 115324->115276 115325->115280 115326->115266 115328 2df83c _wcslen 115327->115328 115329 326258 115327->115329 115332 2df877 115328->115332 115333 2df852 115328->115333 115346 2df9a0 115329->115346 115331 326261 115331->115331 115334 2f042b 21 API calls 115332->115334 115345 2dfb74 21 API calls 115333->115345 115336 2df883 115334->115336 115338 2f045b 21 API calls 115336->115338 115337 2df85a __fread_nolock 115337->115292 115338->115337 115340 2dfa14 115339->115340 115341 2dfa07 115339->115341 115342 2f042b 21 API calls 115340->115342 115341->115295 115343 2dfa1e 115342->115343 115344 2f045b 21 API calls 115343->115344 115344->115341 115345->115337 115347 2df9ae 115346->115347 115348 2df9b7 __fread_nolock 115346->115348 115347->115348 115349 2dfaa1 21 API calls 115347->115349 115348->115331 115348->115348 115349->115348 115351 2f042b 21 API calls 115350->115351 115352 2e520e 115351->115352 115382 2e5d68 115352->115382 115356 2e5240 115357 2e5435 115356->115357 115359 2e52c8 SystemParametersInfoW GetSystemMetrics 115356->115359 115360 2e52f5 115356->115360 115363 328df5 GetWindowRect GetClientRect GetSystemMetrics GetSystemMetrics 115357->115363 115365 328dbb 115357->115365 115377 2e5441 115357->115377 115411 2e4e5a 115357->115411 115359->115360 115361 2e52fb SystemParametersInfoW GetSystemMetrics 115360->115361 115362 2e5341 SetRect AdjustWindowRectEx CreateWindowExW 115360->115362 115361->115362 115366 2e5330 GetSystemMetrics 115361->115366 115362->115357 115367 2e53a2 SetWindowLongW GetClientRect GetStockObject SendMessageW 115362->115367 115363->115357 115364 328e47 GetSystemMetrics 115363->115364 115364->115357 115369 328e7e 115365->115369 115410 368251 GetWindowLongW DestroyWindow 115365->115410 115366->115362 115389 2e4b74 GetCursorPos ScreenToClient 115367->115389 115414 2e544c 39 API calls 115369->115414 115373 2e541d 115409 2e5915 GetWindowLongW 115373->115409 115374 2e5407 SetTimer 115374->115373 115375 328e87 115375->115375 115377->115225 115379 2d335d 115378->115379 115380 2d3364 115378->115380 115379->115380 115419 2f61fc 38 API calls _strftime 115379->115419 115380->115209 115383 2df38f 21 API calls 115382->115383 115384 2e5d95 115383->115384 115385 2df38f 21 API calls 115384->115385 115386 2e5dc3 115385->115386 115387 2df38f 21 API calls 115386->115387 115388 2e5216 115386->115388 115387->115386 115388->115356 115403 2e2960 115388->115403 115390 2e4bbd 115389->115390 115391 2e4bc5 GetAsyncKeyState GetAsyncKeyState 115390->115391 115415 36360f 21 API calls 115390->115415 115395 2e4c11 115391->115395 115396 328c05 115391->115396 115393 328c00 115393->115391 115394 2e4c29 115394->115373 115394->115374 115395->115394 115418 36360f 21 API calls 115395->115418 115396->115395 115397 328c2c 115396->115397 115416 36360f 21 API calls 115396->115416 115417 36360f 21 API calls 115397->115417 115400 328c37 115400->115395 115402 328c40 GetWindowLongW 115400->115402 115402->115397 115404 2e2972 115403->115404 115408 2e2991 __fread_nolock 115403->115408 115406 2f045b 21 API calls 115404->115406 115405 2f042b 21 API calls 115407 2e29a8 115405->115407 115406->115408 115407->115356 115408->115405 115409->115357 115410->115357 115412 2e4e68 GetWindowLongW 115411->115412 115413 2e4e76 115411->115413 115412->115413 115413->115357 115414->115375 115415->115393 115416->115400 115417->115395 115418->115394 115419->115380 115425 30282e _abort 115420->115425 115421 30286c 115431 3026cc 19 API calls _abort 115421->115431 115422 302857 RtlAllocateHeap 115424 30286a 115422->115424 115422->115425 115424->115116 115425->115421 115425->115422 115430 2f4dd8 7 API calls 2 library calls 115425->115430 115427->115116 115428->115117 115429->115120 115430->115425 115431->115424 115432->115125 115433->115127 115434->115130 116547 2d7dcc 116550 2d7070 116547->116550 116549 2d7dd7 116551 2d70e9 116550->116551 116580 2d7509 116550->116580 116552 2d74f3 116551->116552 116553 2d710c 116551->116553 116635 2d2236 39 API calls 116552->116635 116553->116580 116624 2d1ed0 116553->116624 116557 3175a2 116557->116549 116558 2d7490 116560 2d1d83 39 API calls 116558->116560 116559 2d334c 38 API calls 116565 2d7368 116559->116565 116564 2d7308 116560->116564 116562 2d7127 116562->116558 116562->116564 116566 2d7176 116562->116566 116562->116580 116607 2d740b 116562->116607 116636 330202 81 API calls 116562->116636 116637 2d6394 92 API calls 116562->116637 116564->116559 116571 317465 116565->116571 116576 2d737e 116565->116576 116578 317507 116565->116578 116565->116607 116567 31720c 116566->116567 116568 317279 116566->116568 116566->116580 116581 2d7187 116566->116581 116587 31721e 116566->116587 116566->116607 116642 2d3574 21 API calls 116567->116642 116570 3172b6 116568->116570 116568->116581 116640 33c409 21 API calls 116568->116640 116577 2d32c3 21 API calls 116570->116577 116649 355123 77 API calls ___scrt_fastfail 116571->116649 116572 317505 116654 2d1caa 21 API calls 116572->116654 116574 2dfbc8 21 API calls 116593 2d71ba 116574->116593 116576->116572 116576->116578 116633 2d236b 53 API calls 116576->116633 116577->116581 116652 3562ca 21 API calls 116578->116652 116579 317274 116641 2d3574 21 API calls 116579->116641 116655 344358 81 API calls __wsopen_s 116580->116655 116581->116574 116581->116580 116581->116593 116581->116607 116584 3174a2 116594 3174f0 116584->116594 116595 3174b0 116584->116595 116586 2d73c3 116586->116578 116588 317532 116586->116588 116634 2d236b 53 API calls 116586->116634 116587->116570 116638 2d2510 21 API calls 116587->116638 116653 2d236b 53 API calls 116588->116653 116593->116580 116606 2d7232 116593->116606 116593->116607 116643 2d3574 21 API calls 116593->116643 116650 2d3574 21 API calls 116594->116650 116598 2d32c3 21 API calls 116595->116598 116596 317263 116596->116570 116639 2d2510 21 API calls 116596->116639 116597 2d73df 116597->116572 116597->116578 116603 2d7404 116597->116603 116598->116607 116601 3174f9 116651 2d3574 21 API calls 116601->116651 116604 2f042b 21 API calls 116603->116604 116604->116607 116610 3173c1 116606->116610 116613 2d7272 116606->116613 116607->116549 116608 3173de 116646 2d2c6f 38 API calls 116608->116646 116609 3173d4 116645 2d2be0 38 API calls 116609->116645 116610->116609 116644 2d2c6f 38 API calls 116610->116644 116613->116558 116613->116580 116613->116608 116615 2d72ae 116613->116615 116615->116608 116616 2d72c5 116615->116616 116618 2d72ca 116615->116618 116632 2d2be0 38 API calls 116616->116632 116619 2d72f4 116618->116619 116620 317421 116618->116620 116619->116564 116619->116580 116621 317435 116620->116621 116647 2d2c6f 38 API calls 116620->116647 116648 2d2be0 38 API calls 116621->116648 116625 2d2117 116624->116625 116628 2d1ee3 116624->116628 116625->116562 116627 2df38f 21 API calls 116627->116628 116628->116627 116630 2d1f8d 116628->116630 116656 2f0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 116628->116656 116657 2f06d4 28 API calls __onexit 116628->116657 116658 2f080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 116628->116658 116630->116562 116632->116618 116633->116586 116634->116597 116635->116580 116636->116562 116637->116562 116638->116596 116639->116579 116640->116579 116641->116567 116642->116570 116643->116606 116644->116609 116645->116608 116646->116618 116647->116621 116648->116580 116649->116584 116650->116601 116651->116572 116652->116588 116653->116572 116654->116607 116655->116557 116656->116628 116657->116628 116658->116628 115435 308232 115440 307fee 115435->115440 115438 30825a 115445 30801f try_get_first_available_module 115440->115445 115442 30821e 115459 302610 25 API calls pre_c_initialization 115442->115459 115444 308173 115444->115438 115452 3108ae 115444->115452 115448 308168 115445->115448 115455 2f8d2b 39 API calls 2 library calls 115445->115455 115447 3081bc 115447->115448 115456 2f8d2b 39 API calls 2 library calls 115447->115456 115448->115444 115458 3026cc 19 API calls _abort 115448->115458 115450 3081db 115450->115448 115457 2f8d2b 39 API calls 2 library calls 115450->115457 115460 30ffab 115452->115460 115454 3108c9 115454->115438 115455->115447 115456->115450 115457->115448 115458->115442 115459->115444 115463 30ffb7 ___scrt_is_nonwritable_in_current_image 115460->115463 115461 30ffc5 115518 3026cc 19 API calls _abort 115461->115518 115463->115461 115465 30fffe 115463->115465 115464 30ffca 115519 302610 25 API calls pre_c_initialization 115464->115519 115471 310585 115465->115471 115470 30ffd4 ___scrt_is_nonwritable_in_current_image 115470->115454 115521 310359 115471->115521 115474 3105d0 115539 30504f 115474->115539 115475 3105b7 115553 3026b9 19 API calls _abort 115475->115553 115478 3105d5 115479 3105f5 115478->115479 115480 3105de 115478->115480 115552 3102c4 CreateFileW 115479->115552 115555 3026b9 19 API calls _abort 115480->115555 115484 3105e3 115556 3026cc 19 API calls _abort 115484->115556 115485 31062e 115487 3106ab GetFileType 115485->115487 115489 310680 GetLastError 115485->115489 115557 3102c4 CreateFileW 115485->115557 115488 3106b6 GetLastError 115487->115488 115493 3106fd 115487->115493 115559 302696 19 API calls __dosmaperr 115488->115559 115558 302696 19 API calls __dosmaperr 115489->115558 115492 3106c4 CloseHandle 115495 3105bc 115492->115495 115496 3106ed 115492->115496 115561 304f98 20 API calls 2 library calls 115493->115561 115554 3026cc 19 API calls _abort 115495->115554 115560 3026cc 19 API calls _abort 115496->115560 115498 310673 115498->115487 115498->115489 115500 31071e 115502 31076a 115500->115502 115562 3104d5 71 API calls 3 library calls 115500->115562 115501 3106f2 115501->115495 115506 310797 115502->115506 115563 310077 71 API calls 4 library calls 115502->115563 115505 310790 115505->115506 115507 3107a8 115505->115507 115564 3084de 115506->115564 115509 310022 115507->115509 115510 310826 CloseHandle 115507->115510 115520 31004b LeaveCriticalSection __wsopen_s 115509->115520 115579 3102c4 CreateFileW 115510->115579 115512 310851 115513 31085b GetLastError 115512->115513 115514 310887 115512->115514 115580 302696 19 API calls __dosmaperr 115513->115580 115514->115509 115516 310867 115581 305161 20 API calls 2 library calls 115516->115581 115518->115464 115519->115470 115520->115470 115522 310394 115521->115522 115523 31037a 115521->115523 115582 3102e9 115522->115582 115523->115522 115589 3026cc 19 API calls _abort 115523->115589 115526 310389 115590 302610 25 API calls pre_c_initialization 115526->115590 115528 3103cc 115529 3103fb 115528->115529 115591 3026cc 19 API calls _abort 115528->115591 115534 31044e 115529->115534 115593 2fd5ad 25 API calls 2 library calls 115529->115593 115532 310449 115532->115534 115535 3104c8 115532->115535 115533 3103f0 115592 302610 25 API calls pre_c_initialization 115533->115592 115534->115474 115534->115475 115594 302620 11 API calls _abort 115535->115594 115538 3104d4 115540 30505b ___scrt_is_nonwritable_in_current_image 115539->115540 115597 302e35 EnterCriticalSection 115540->115597 115542 3050a9 115598 305158 115542->115598 115543 305087 115601 304e2c 115543->115601 115544 305062 115544->115542 115544->115543 115549 3050f5 EnterCriticalSection 115544->115549 115547 3050d2 ___scrt_is_nonwritable_in_current_image 115547->115478 115549->115542 115550 305102 LeaveCriticalSection 115549->115550 115550->115544 115552->115485 115553->115495 115554->115509 115555->115484 115556->115495 115557->115498 115558->115495 115559->115492 115560->115501 115561->115500 115562->115502 115563->115505 115626 3051f2 115564->115626 115566 3084f4 115639 305161 20 API calls 2 library calls 115566->115639 115567 3084ee 115567->115566 115569 3051f2 __wsopen_s 25 API calls 115567->115569 115578 308526 115567->115578 115572 30851d 115569->115572 115570 3051f2 __wsopen_s 25 API calls 115573 308532 CloseHandle 115570->115573 115571 30854c 115577 30856e 115571->115577 115640 302696 19 API calls __dosmaperr 115571->115640 115574 3051f2 __wsopen_s 25 API calls 115572->115574 115573->115566 115575 30853e GetLastError 115573->115575 115574->115578 115575->115566 115577->115509 115578->115566 115578->115570 115579->115512 115580->115516 115581->115514 115584 310301 115582->115584 115583 31031c 115583->115528 115584->115583 115595 3026cc 19 API calls _abort 115584->115595 115586 310340 115596 302610 25 API calls pre_c_initialization 115586->115596 115588 31034b 115588->115528 115589->115526 115590->115522 115591->115533 115592->115529 115593->115532 115594->115538 115595->115586 115596->115588 115597->115544 115609 302e7d LeaveCriticalSection 115598->115609 115600 30515f 115600->115547 115610 30287c 115601->115610 115603 304e4b 115618 3027f4 115603->115618 115604 304e3e 115604->115603 115617 3032dc 11 API calls 2 library calls 115604->115617 115608 304f73 EnterCriticalSection 115608->115542 115609->115600 115615 302889 _abort 115610->115615 115611 3028c9 115624 3026cc 19 API calls _abort 115611->115624 115612 3028b4 RtlAllocateHeap 115613 3028c7 115612->115613 115612->115615 115613->115604 115615->115611 115615->115612 115623 2f4dd8 7 API calls 2 library calls 115615->115623 115617->115604 115619 30282c 115618->115619 115620 3027ff RtlFreeHeap 115618->115620 115619->115542 115619->115608 115620->115619 115621 302814 115620->115621 115625 3026cc 19 API calls _abort 115621->115625 115623->115615 115624->115613 115625->115619 115627 305214 115626->115627 115628 3051ff 115626->115628 115633 305239 115627->115633 115643 3026b9 19 API calls _abort 115627->115643 115641 3026b9 19 API calls _abort 115628->115641 115630 305204 115642 3026cc 19 API calls _abort 115630->115642 115633->115567 115634 305244 115644 3026cc 19 API calls _abort 115634->115644 115635 30520c 115635->115567 115637 30524c 115645 302610 25 API calls pre_c_initialization 115637->115645 115639->115571 115640->115577 115641->115630 115642->115635 115643->115634 115644->115637 115645->115635 116659 313e53 116660 313e5d 116659->116660 116662 2d381e ISource 116659->116662 116687 2d29d0 21 API calls ISource 116660->116687 116670 2d38bc 116662->116670 116688 2f0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 116662->116688 116663 2d3e3d 116691 344358 81 API calls __wsopen_s 116663->116691 116666 313fc6 116667 2df38f 21 API calls 116666->116667 116666->116670 116668 313fe0 116667->116668 116689 2f06d4 28 API calls __onexit 116668->116689 116670->116663 116675 2d3713 116670->116675 116685 2d37bc ISource 116670->116685 116671 313fea 116690 2f080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 116671->116690 116674 3143d3 116676 2d376c 116675->116676 116677 3142b9 116675->116677 116681 2d3c35 ISource 116675->116681 116676->116677 116686 2d37a6 ISource 116676->116686 116692 344358 81 API calls __wsopen_s 116677->116692 116678 2d415b 116680 2f042b 21 API calls 116678->116680 116679 2d4887 116682 313cef 116679->116682 116679->116685 116679->116686 116680->116686 116681->116678 116681->116679 116681->116686 116684 2dfbc8 21 API calls 116682->116684 116682->116685 116683 2dfbc8 21 API calls 116683->116686 116684->116685 116686->116683 116686->116685 116687->116662 116688->116666 116689->116671 116690->116670 116691->116677 116692->116674 115646 2e3aa8 GetForegroundWindow 115647 2e4e5a GetWindowLongW 115646->115647 115648 2e3abc 115647->115648 115649 2e3ad5 115648->115649 115650 2e4b74 26 API calls 115648->115650 115650->115649 116693 3195d9 116694 3195e7 116693->116694 116696 2d9d61 ISource 116693->116696 116695 2d9e13 116697 2d9dfc ISource 116696->116697 116698 2d1dd1 21 API calls 116696->116698 116697->116695 116700 2d24c6 21 API calls ISource 116697->116700 116698->116697 116700->116697 116701 2d1044 116706 2d921a 116701->116706 116743 2ef70a 116706->116743 116710 2d9291 116711 2df38f 21 API calls 116710->116711 116712 2d929b 116711->116712 116713 2df38f 21 API calls 116712->116713 116714 2d92a5 116713->116714 116715 2df38f 21 API calls 116714->116715 116716 2d92af 116715->116716 116717 2df38f 21 API calls 116716->116717 116718 2d92ed 116717->116718 116719 2df38f 21 API calls 116718->116719 116720 2d93b9 116719->116720 116753 2efb30 116720->116753 116724 2d93eb 116725 2df38f 21 API calls 116724->116725 116789 2ef7cf 116743->116789 116746 2ef7cf 21 API calls 116747 2ef742 116746->116747 116748 2df38f 21 API calls 116747->116748 116749 2ef74e 116748->116749 116750 2df82c 21 API calls 116749->116750 116751 2d9250 116750->116751 116752 2ef9fb 6 API calls 116751->116752 116752->116710 116754 2df38f 21 API calls 116753->116754 116755 2efb40 116754->116755 116756 2df38f 21 API calls 116755->116756 116757 2efb48 116756->116757 116796 2df2ae 116757->116796 116760 2df2ae 21 API calls 116761 2efb58 116760->116761 116762 2df38f 21 API calls 116761->116762 116763 2efb63 116762->116763 116764 2f042b 21 API calls 116763->116764 116765 2d93c3 116764->116765 116766 2ef508 116765->116766 116767 2ef516 116766->116767 116768 2df38f 21 API calls 116767->116768 116769 2ef521 116768->116769 116770 2df38f 21 API calls 116769->116770 116771 2ef52c 116770->116771 116772 2df38f 21 API calls 116771->116772 116773 2ef537 116772->116773 116774 2df38f 21 API calls 116773->116774 116775 2ef542 116774->116775 116776 2df2ae 21 API calls 116775->116776 116777 2ef54d 116776->116777 116778 2f042b 21 API calls 116777->116778 116779 2ef554 RegisterWindowMessageW 116778->116779 116779->116724 116790 2df38f 21 API calls 116789->116790 116791 2ef7da 116790->116791 116792 2df38f 21 API calls 116791->116792 116793 2ef7e2 116792->116793 116794 2df38f 21 API calls 116793->116794 116795 2ef738 116794->116795 116795->116746 116797 2df38f 21 API calls 116796->116797 116798 2df2b6 116797->116798 116798->116760 116801 e76c4a 116804 e9ec41 116801->116804 116811 e9ee57 116804->116811 116806 e9ec50 116807 e76c56 116806->116807 116814 e7a8c9 116806->116814 116818 e942b1 116806->116818 116898 e93cf5 GetCurrentProcess TerminateProcess 116806->116898 116899 e9efee GetPEB 116811->116899 116813 e9ee63 116813->116806 116815 e7a8fc 116814->116815 116901 e7a859 116815->116901 116819 e942b9 116818->116819 116819->116819 116963 e7cc49 GetModuleHandleA 116819->116963 116898->116807 116900 e9f001 116899->116900 116900->116813 116902 e7a8a4 116901->116902 116903 e7a86e 116901->116903 116902->116807 116903->116902 116906 e7c979 116903->116906 116912 e7be19 116903->116912 116907 e7c98a 116906->116907 116908 e7c9bb 116906->116908 116907->116908 116916 e7be61 116907->116916 116908->116903 116913 e7be45 116912->116913 116914 e7be29 GetModuleFileNameA 116912->116914 116913->116903 116944 e7c0ad GetModuleFileNameA RegOpenKeyExA 116914->116944 116917 e7be75 116916->116917 116919 e7be91 LoadStringA 116916->116919 116918 e7be19 30 API calls 116917->116918 116917->116919 116918->116919 116920 e7ac55 116919->116920 116925 e7ac29 116920->116925 116922 e7ac65 116930 e7ab65 116922->116930 116926 e7ac51 116925->116926 116927 e7ac2d 116925->116927 116926->116922 116934 e795e5 116927->116934 116931 e7ab6b 116930->116931 116933 e7ab86 116930->116933 116931->116933 116939 e79615 116931->116939 116933->116908 116935 e79605 116934->116935 116936 e795ed 116934->116936 116935->116922 116936->116935 116938 e796ed 11 API calls 116936->116938 116938->116935 116940 e7961a 116939->116940 116942 e7962d 116939->116942 116940->116942 116943 e796ed 11 API calls 116940->116943 116942->116933 116943->116942 116945 e7c12f 116944->116945 116946 e7c0ef RegOpenKeyExA 116944->116946 116962 e7bed5 12 API calls 116945->116962 116946->116945 116947 e7c10d RegOpenKeyExA 116946->116947 116947->116945 116949 e7c1b8 lstrcpyn GetThreadLocale GetLocaleInfoA 116947->116949 116953 e7c1ef 116949->116953 116954 e7c2e8 116949->116954 116950 e7c154 RegQueryValueExA 116951 e7c196 RegCloseKey 116950->116951 116952 e7c174 RegQueryValueExA 116950->116952 116951->116913 116952->116951 116955 e7c192 116952->116955 116953->116954 116956 e7c1ff lstrlen 116953->116956 116954->116913 116955->116951 116957 e7c218 116956->116957 116957->116954 116958 e7c246 lstrcpyn LoadLibraryExA 116957->116958 116959 e7c272 116957->116959 116958->116959 116959->116954 116960 e7c27c lstrcpyn LoadLibraryExA 116959->116960 116960->116954 116961 e7c2b2 lstrcpyn LoadLibraryExA 116960->116961 116961->116954 116962->116950 116964 e7cc7c 116963->116964 116965 e7a8c9 42 API calls 116964->116965 116966 e7cc88 116965->116966 116967 e908f5 116966->116967 117238 e90859 116967->117238 116969 e9091a 117247 e9075d 116969->117247 116973 e9092f 117264 e8e459 116973->117264 117290 e906bd 117238->117290 117240 e90871 117241 e90881 117240->117241 117242 e90876 117240->117242 117244 e7abb9 11 API calls 117241->117244 117298 e907c5 11 API calls 117242->117298 117246 e9088d 117244->117246 117245 e9087f 117245->116969 117246->116969 117248 e906bd 14 API calls 117247->117248 117249 e90775 117248->117249 117250 e7ae09 117249->117250 117251 e7ae0d 117250->117251 117252 e7ae4c 117250->117252 117253 e7ae17 117251->117253 117254 e7abb9 117251->117254 117252->116973 117255 e7ae41 117253->117255 117256 e7ae2a 117253->117256 117260 e7ac29 11 API calls 117254->117260 117261 e7abcd 117254->117261 117259 e7b131 11 API calls 117255->117259 117299 e7b131 117256->117299 117258 e7abfb 117258->116973 117263 e7ae2f 117259->117263 117260->117261 117261->117258 117262 e79615 11 API calls 117261->117262 117262->117258 117263->116973 117265 e8e46d 117264->117265 117305 e8e2dd 117265->117305 117268 e8f07d 117269 e8f09e 117268->117269 117317 e8f009 117269->117317 117274 e7ab65 11 API calls 117276 e8f0c9 117274->117276 117275 e7ad4d 11 API calls 117275->117276 117276->117275 117278 e8f130 117276->117278 117325 e7aec1 117276->117325 117279 e7ab89 11 API calls 117278->117279 117280 e8f14a 117279->117280 117291 e7ab65 11 API calls 117290->117291 117292 e906da 117291->117292 117293 e90701 RegOpenKeyExA 117292->117293 117294 e9074b RegCloseKey 117293->117294 117295 e9070c 117293->117295 117294->117240 117296 e90725 RegQueryValueExA 117295->117296 117296->117294 117297 e90733 117296->117297 117297->117294 117298->117245 117300 e7b13e 117299->117300 117304 e7b16e 117299->117304 117302 e7b14a 117300->117302 117303 e7ac29 11 API calls 117300->117303 117301 e7ab65 11 API calls 117301->117302 117302->117263 117303->117304 117304->117301 117306 e8e305 117305->117306 117307 e7ab65 11 API calls 117306->117307 117309 e8e40f 117307->117309 117310 e7ae09 11 API calls 117309->117310 117311 e8e433 117309->117311 117314 e7ad4d 117309->117314 117310->117309 117312 e7ab65 11 API calls 117311->117312 117313 e8e448 117312->117313 117313->117268 117315 e7ac55 11 API calls 117314->117315 117316 e7ad5a 117315->117316 117316->117309 117318 e8f01d 117317->117318 117334 e8ee8d 117318->117334 117321 e7abfd 117323 e7ac01 117321->117323 117322 e7ac25 117322->117274 117323->117322 117324 e79615 11 API calls 117323->117324 117324->117322 117326 e7aed2 117325->117326 117335 e8eeb5 117334->117335 117336 e7ab65 11 API calls 117335->117336 117339 e8efbf 117336->117339 117337 e7ad4d 11 API calls 117337->117339 117338 e7ae09 11 API calls 117338->117339 117339->117337 117339->117338 117340 e8efe3 117339->117340 117341 e7ab65 11 API calls 117340->117341 117342 e8eff8 117341->117342 117342->117321 115651 2e397e 115654 2e3998 115651->115654 115655 2e39af 115654->115655 115656 2e39b4 115655->115656 115657 2e3a13 115655->115657 115695 2e3a11 115655->115695 115661 2e3a8d PostQuitMessage 115656->115661 115662 2e39c1 115656->115662 115659 3280b1 115657->115659 115660 2e3a19 115657->115660 115658 2e39f8 DefWindowProcW 115685 2e3992 115658->115685 115710 2dad2c 10 API calls 115659->115710 115664 2e3a45 SetTimer RegisterWindowMessageW 115660->115664 115665 2e3a20 115660->115665 115661->115685 115666 2e39cc 115662->115666 115667 32811e 115662->115667 115669 2e3a6e CreatePopupMenu 115664->115669 115664->115685 115673 328052 115665->115673 115674 2e3a29 KillTimer 115665->115674 115670 2e39d6 115666->115670 115671 2e3a97 115666->115671 115715 33cde4 65 API calls ___scrt_fastfail 115667->115715 115669->115685 115675 328103 115670->115675 115676 2e39e1 115670->115676 115699 2e3619 115671->115699 115672 3280d2 115711 2dad46 40 API calls 115672->115711 115680 328057 115673->115680 115681 32808d MoveWindow 115673->115681 115706 2e35b3 Shell_NotifyIconW ___scrt_fastfail 115674->115706 115675->115658 115714 331bdd 21 API calls 115675->115714 115683 2e39ec 115676->115683 115684 2e3a7b 115676->115684 115678 328130 115678->115658 115678->115685 115686 32807c SetFocus 115680->115686 115687 32805d 115680->115687 115681->115685 115683->115658 115712 2e35b3 Shell_NotifyIconW ___scrt_fastfail 115683->115712 115708 2e36c0 75 API calls ___scrt_fastfail 115684->115708 115686->115685 115687->115683 115690 328066 115687->115690 115688 2e3a3c 115707 2e514d DeleteObject DestroyWindow 115688->115707 115709 2dad2c 10 API calls 115690->115709 115693 2e3a8b 115693->115685 115695->115658 115697 3280f7 115713 2e34c7 60 API calls ___scrt_fastfail 115697->115713 115700 2e36b7 115699->115700 115701 2e3631 ___scrt_fastfail 115699->115701 115700->115685 115716 2e37b5 115701->115716 115703 2e36a0 KillTimer SetTimer 115703->115700 115704 2e3658 115704->115703 115705 327d46 Shell_NotifyIconW 115704->115705 115705->115703 115706->115688 115707->115685 115708->115693 115709->115685 115710->115672 115711->115683 115712->115697 115713->115695 115714->115695 115715->115678 115717 2e37d2 115716->115717 115736 2e38b7 115716->115736 115718 2df6d1 21 API calls 115717->115718 115719 2e37e0 115718->115719 115720 2e37ed 115719->115720 115721 327f87 LoadStringW 115719->115721 115722 2df82c 21 API calls 115720->115722 115724 327fa1 115721->115724 115723 2e3802 115722->115723 115725 2e380f 115723->115725 115733 327fbd 115723->115733 115727 2dfbc8 21 API calls 115724->115727 115729 2e3835 ___scrt_fastfail 115724->115729 115725->115724 115726 2e3819 115725->115726 115746 2df91b 115726->115746 115727->115729 115734 2e389d Shell_NotifyIconW 115729->115734 115732 328000 115765 2f016e 50 API calls 115732->115765 115733->115729 115733->115732 115735 2df38f 21 API calls 115733->115735 115734->115736 115737 327fe7 115735->115737 115736->115704 115764 33a7a8 22 API calls 115737->115764 115740 32801f 115742 2df91b 21 API calls 115740->115742 115741 327ff2 115743 2df78e 21 API calls 115741->115743 115744 328030 115742->115744 115743->115732 115745 2df91b 21 API calls 115744->115745 115745->115729 115747 3262c2 115746->115747 115748 2df932 115746->115748 115749 2f042b 21 API calls 115747->115749 115766 2df8bc 115748->115766 115751 3262cc _wcslen 115749->115751 115753 2f045b 21 API calls 115751->115753 115752 2df93d 115755 2df78e 115752->115755 115754 326308 __fread_nolock 115753->115754 115756 3261ef 115755->115756 115757 2df7a0 115755->115757 115791 331b82 21 API calls __fread_nolock 115756->115791 115781 2df716 115757->115781 115760 2df7ac 115760->115729 115761 3261f9 115762 326205 115761->115762 115763 2dfbc8 21 API calls 115761->115763 115763->115762 115764->115741 115765->115740 115767 2df8cc _wcslen 115766->115767 115768 2df8df 115767->115768 115769 326266 115767->115769 115776 2df7b3 115768->115776 115771 2f042b 21 API calls 115769->115771 115773 326270 115771->115773 115772 2df8ec __fread_nolock 115772->115752 115774 2f045b 21 API calls 115773->115774 115775 3262a3 __fread_nolock 115774->115775 115777 2df7cb 115776->115777 115780 2df7c4 __fread_nolock 115776->115780 115778 326214 115777->115778 115779 2f045b 21 API calls 115777->115779 115779->115780 115780->115772 115782 2df725 115781->115782 115787 2df759 __fread_nolock 115781->115787 115783 326186 115782->115783 115784 2df74c 115782->115784 115782->115787 115785 2f042b 21 API calls 115783->115785 115786 2df7b3 21 API calls 115784->115786 115788 326195 115785->115788 115786->115787 115787->115760 115789 2f045b 21 API calls 115788->115789 115790 3261cc __fread_nolock 115789->115790 115791->115761 117668 2feb9e 117669 2febaa ___scrt_is_nonwritable_in_current_image 117668->117669 117670 2febcb 117669->117670 117671 2febb6 117669->117671 117681 2f90a1 EnterCriticalSection 117670->117681 117687 3026cc 19 API calls _abort 117671->117687 117674 2febbb 117688 302610 25 API calls pre_c_initialization 117674->117688 117675 2febd7 117682 2fec0b 117675->117682 117680 2febc6 ___scrt_is_nonwritable_in_current_image 117681->117675 117690 2fec36 117682->117690 117684 2fec18 117686 2febe4 117684->117686 117710 3026cc 19 API calls _abort 117684->117710 117689 2fec01 LeaveCriticalSection __fread_nolock 117686->117689 117687->117674 117688->117680 117689->117680 117691 2fec5e 117690->117691 117692 2fec44 117690->117692 117694 2fd7f5 __fread_nolock 25 API calls 117691->117694 117714 3026cc 19 API calls _abort 117692->117714 117696 2fec67 117694->117696 117695 2fec49 117715 302610 25 API calls pre_c_initialization 117695->117715 117711 309239 117696->117711 117700 2fecef 117703 2fed0c 117700->117703 117706 2fed1e 117700->117706 117701 2fed6b 117702 2fed78 117701->117702 117701->117706 117717 3026cc 19 API calls _abort 117702->117717 117716 2fef4f 30 API calls 4 library calls 117703->117716 117707 2fec54 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 117706->117707 117718 2fedcb 29 API calls 2 library calls 117706->117718 117707->117684 117708 2fed16 117708->117707 117710->117686 117719 3090b6 117711->117719 117713 2fec83 117713->117700 117713->117701 117713->117707 117714->117695 117715->117707 117716->117708 117717->117707 117718->117707 117720 3090c2 ___scrt_is_nonwritable_in_current_image 117719->117720 117721 3090ca 117720->117721 117723 3090e2 117720->117723 117745 3026b9 19 API calls _abort 117721->117745 117722 309196 117750 3026b9 19 API calls _abort 117722->117750 117723->117722 117729 30911a 117723->117729 117725 3090cf 117746 3026cc 19 API calls _abort 117725->117746 117728 30919b 117751 3026cc 19 API calls _abort 117728->117751 117744 304f73 EnterCriticalSection 117729->117744 117732 3091a3 117752 302610 25 API calls pre_c_initialization 117732->117752 117733 309120 117735 309144 117733->117735 117736 309159 117733->117736 117747 3026cc 19 API calls _abort 117735->117747 117739 3091bb __wsopen_s 27 API calls 117736->117739 117738 3090d7 ___scrt_is_nonwritable_in_current_image 117738->117713 117740 309154 117739->117740 117749 30918e LeaveCriticalSection __wsopen_s 117740->117749 117741 309149 117748 3026b9 19 API calls _abort 117741->117748 117744->117733 117745->117725 117746->117738 117747->117741 117748->117740 117749->117738 117750->117728 117751->117732 117752->117738 117753 313644 117764 2d1b4d 117753->117764 117755 31365a 117756 3136d3 117755->117756 117773 2d362b 22 API calls 117755->117773 117761 314248 117756->117761 117775 344358 81 API calls __wsopen_s 117756->117775 117758 3136b3 117758->117756 117774 342823 21 API calls 117758->117774 117776 344358 81 API calls __wsopen_s 117761->117776 117763 3143d3 117763->117763 117765 2d1b6e 117764->117765 117766 2d1b5b 117764->117766 117768 2d1ba1 117765->117768 117769 2d1b73 117765->117769 117777 2d3574 21 API calls 117766->117777 117778 2d3574 21 API calls 117768->117778 117771 2f042b 21 API calls 117769->117771 117772 2d1b65 117771->117772 117772->117755 117773->117758 117774->117756 117775->117761 117776->117763 117777->117772 117778->117772 117779 2d1098 117784 2e310d 117779->117784 117783 2d10a7 117785 2df38f 21 API calls 117784->117785 117786 2e3124 GetVersionExW 117785->117786 117787 2df82c 21 API calls 117786->117787 117788 2e3171 117787->117788 117789 2df9a0 21 API calls 117788->117789 117803 2e31a7 117788->117803 117790 2e319b 117789->117790 117805 2df433 117790->117805 117791 2e324c GetCurrentProcess IsWow64Process 117793 2e3268 117791->117793 117794 327c74 GetSystemInfo 117793->117794 117795 2e3280 LoadLibraryA 117793->117795 117796 2e32cf GetSystemInfo 117795->117796 117797 2e3291 GetProcAddress 117795->117797 117799 2e32a7 117796->117799 117797->117796 117798 2e32a1 GetNativeSystemInfo 117797->117798 117798->117799 117801 2e32ab FreeLibrary 117799->117801 117802 2d109d 117799->117802 117800 327c2f 117801->117802 117804 2f06d4 28 API calls __onexit 117802->117804 117803->117791 117803->117800 117804->117783 117806 2df441 117805->117806 117807 2df9a0 21 API calls 117806->117807 117808 2df455 117807->117808 117808->117803 115792 312fa7 115793 2f042b 21 API calls 115792->115793 115794 312fae 115793->115794 115795 2f045b 21 API calls 115794->115795 115797 312fc7 __fread_nolock 115794->115797 115795->115797 115796 2f045b 21 API calls 115798 312fec 115796->115798 115797->115796 117809 2d105b 117814 2e0e5b 117809->117814 117811 2d106a 117845 2f06d4 28 API calls __onexit 117811->117845 117813 2d1074 117815 2e0e6b __wsopen_s 117814->117815 117816 2df38f 21 API calls 117815->117816 117817 2e0f21 117816->117817 117846 2d1155 117817->117846 117819 2e0f2a 117853 2efd48 117819->117853 117822 2df91b 21 API calls 117823 2e0f43 117822->117823 117859 2e2608 117823->117859 117826 2df38f 21 API calls 117827 2e0f5b 117826->117827 117828 2df9fa 21 API calls 117827->117828 117829 2e0f64 RegOpenKeyExW 117828->117829 117830 326fd8 RegQueryValueExW 117829->117830 117834 2e0f86 117829->117834 117831 326ff5 117830->117831 117832 32706e RegCloseKey 117830->117832 117833 2f045b 21 API calls 117831->117833 117832->117834 117844 327080 _wcslen 117832->117844 117835 32700e 117833->117835 117834->117811 117865 2e2572 117835->117865 117838 327036 117839 2df82c 21 API calls 117838->117839 117841 327050 ISource 117839->117841 117840 2df6ad 21 API calls 117840->117844 117841->117832 117842 2dfa3b 21 API calls 117842->117844 117843 2e2608 21 API calls 117843->117844 117844->117834 117844->117840 117844->117842 117844->117843 117845->117813 117868 311e50 117846->117868 117849 2dfa3b 21 API calls 117850 2d1188 117849->117850 117870 2d119f 117850->117870 117852 2d1192 117852->117819 117854 311e50 __wsopen_s 117853->117854 117855 2efd55 GetFullPathNameW 117854->117855 117856 2efd77 117855->117856 117857 2df82c 21 API calls 117856->117857 117858 2e0f35 117857->117858 117858->117822 117860 2e2617 117859->117860 117864 2e2638 __fread_nolock 117859->117864 117862 2f045b 21 API calls 117860->117862 117861 2f042b 21 API calls 117863 2e0f52 117861->117863 117862->117864 117863->117826 117864->117861 117866 2f042b 21 API calls 117865->117866 117867 2e2584 RegQueryValueExW 117866->117867 117867->117838 117867->117841 117869 2d1162 GetModuleFileNameW 117868->117869 117869->117849 117871 311e50 __wsopen_s 117870->117871 117872 2d11ac GetFullPathNameW 117871->117872 117873 2d11e8 117872->117873 117874 2d11cb 117872->117874 117876 2df9fa 21 API calls 117873->117876 117875 2df82c 21 API calls 117874->117875 117877 2d11d7 117875->117877 117876->117877 117878 2df433 21 API calls 117877->117878 117879 2d11e3 117878->117879 117879->117852 117880 2e3ad9 117881 2e4164 117880->117881 117882 2e4e5a GetWindowLongW 117881->117882 117883 2e4178 117882->117883 117884 2e419b 117883->117884 117898 328447 117883->117898 117932 2e426f DefDlgProcW 117883->117932 117886 2e41f6 117884->117886 117887 2e41a7 117884->117887 117888 2e41ff 117886->117888 117889 2e4228 117886->117889 117890 2e42e8 117887->117890 117891 2e41b6 117887->117891 117971 2e432d 117887->117971 117893 3285c0 117888->117893 117894 2e4205 117888->117894 117892 2e4236 117889->117892 117933 3285a3 117889->117933 117899 328577 117890->117899 117900 2e42f3 117890->117900 117895 2e41bc 117891->117895 117896 3284e8 117891->117896 117892->117893 117897 2e423f 117892->117897 117993 3694ed 110 API calls 117893->117993 117902 2e420e 117894->117902 117903 2e428a 117894->117903 117908 2e4349 117895->117908 117909 2e41c5 117895->117909 117984 369ad7 84 API calls 117896->117984 117904 3285f0 117897->117904 117929 328623 117897->117929 117930 2e425a 117897->117930 117968 32849d 117898->117968 117981 34c4ff 53 API calls _strftime 117898->117981 117991 369fb4 98 API calls 117899->117991 117911 2e42fc 117900->117911 117912 328565 117900->117912 117914 2e421c 117902->117914 117937 328584 117902->117937 117907 2e42ad 117903->117907 117903->117937 117938 2e42a3 117903->117938 117919 32860b DefDlgProcW 117904->117919 117920 2e4e5a GetWindowLongW 117907->117920 117918 2e434b 117908->117918 117935 2e436d 117908->117935 117921 2e41ce 117909->117921 117922 2e4280 117909->117922 117925 2e4305 117911->117925 117926 32854f 117911->117926 117990 369e05 CreateProcessW CloseHandle DefDlgProcW 117912->117990 117975 2e3f61 38 API calls 117914->117975 117916 32859a 117916->117932 117916->117933 117917 3285a9 117992 369e3a ClientToScreen ImageList_DragMove DefDlgProcW 117917->117992 117978 2e410d DefDlgProcW GetWindowLongW 117918->117978 117945 2e41f1 117919->117945 117941 2e42b8 GetSysColor 117920->117941 117939 2e41d7 117921->117939 117940 2e4361 117921->117940 117976 2e3fe0 59 API calls 117922->117976 117923 32847f 117957 2e4e5a GetWindowLongW 117923->117957 117923->117968 117943 2e430e 117925->117943 117944 328539 117925->117944 117989 3699f9 6 API calls 117926->117989 117927 3284d6 117927->117945 117995 369dba 22 API calls 117929->117995 117948 328617 117930->117948 117949 2e4263 117930->117949 117932->117945 117996 369495 28 API calls 117933->117996 117935->117945 117951 2e4381 117935->117951 117935->117968 117937->117916 117937->117917 117938->117907 117938->117932 117939->117932 117956 2e41e0 117939->117956 117979 2e3f00 DefDlgProcW PostMessageW PostMessageW GetWindowLongW 117940->117979 117952 2e42d6 SetBkColor 117941->117952 117953 2e42d3 117941->117953 117958 328523 117943->117958 117959 2e431a 117943->117959 117988 369f78 GetWindowLongW DefDlgProcW 117944->117988 117946 3284ba 117946->117932 117960 3284c4 117946->117960 117947 3284db 117983 369e94 GetWindowLongW GetWindowRect GetWindowRect MoveWindow 117947->117983 117994 369b58 54 API calls 117948->117994 117949->117932 117962 3285dc IsThemeActive 117949->117962 117980 2e3f38 18 API calls 117951->117980 117977 2e4b00 22 API calls 117952->117977 117953->117952 117974 2e3ae2 7 API calls 117956->117974 117957->117968 117987 369709 52 API calls ___scrt_fastfail 117958->117987 117969 2e4323 117959->117969 117970 32850c 117959->117970 117982 36a94e 9 API calls 117960->117982 117962->117919 117968->117945 117968->117946 117968->117947 117969->117932 117969->117971 117986 36aca8 27 API calls 117970->117986 117985 36a8ca 41 API calls 117971->117985 117974->117945 117975->117945 117976->117945 117977->117945 117978->117945 117979->117945 117980->117945 117981->117923 117982->117927 117983->117945 117984->117927 117985->117945 117986->117945 117987->117927 117988->117945 117989->117945 117990->117945 117991->117927 117992->117945 117993->117927 117994->117927 117995->117945 117996->117945 115799 308f2a 115800 308f37 115799->115800 115804 308f4f 115799->115804 115856 3026cc 19 API calls _abort 115800->115856 115802 308f3c 115857 302610 25 API calls pre_c_initialization 115802->115857 115805 308faa 115804->115805 115811 308f47 115804->115811 115858 30fc75 20 API calls 2 library calls 115804->115858 115819 2fd7f5 115805->115819 115808 308fc2 115826 308a62 115808->115826 115810 308fc9 115810->115811 115812 2fd7f5 __fread_nolock 25 API calls 115810->115812 115813 308ff5 115812->115813 115813->115811 115814 2fd7f5 __fread_nolock 25 API calls 115813->115814 115815 309003 115814->115815 115815->115811 115816 2fd7f5 __fread_nolock 25 API calls 115815->115816 115817 309013 115816->115817 115818 2fd7f5 __fread_nolock 25 API calls 115817->115818 115818->115811 115820 2fd816 115819->115820 115821 2fd801 115819->115821 115820->115808 115859 3026cc 19 API calls _abort 115821->115859 115823 2fd806 115860 302610 25 API calls pre_c_initialization 115823->115860 115825 2fd811 115825->115808 115827 308a6e ___scrt_is_nonwritable_in_current_image 115826->115827 115828 308a76 115827->115828 115829 308a8e 115827->115829 115927 3026b9 19 API calls _abort 115828->115927 115830 308b54 115829->115830 115835 308ac7 115829->115835 115934 3026b9 19 API calls _abort 115830->115934 115832 308a7b 115928 3026cc 19 API calls _abort 115832->115928 115838 308ad6 115835->115838 115839 308aeb 115835->115839 115836 308b59 115935 3026cc 19 API calls _abort 115836->115935 115837 308a83 ___scrt_is_nonwritable_in_current_image 115837->115810 115929 3026b9 19 API calls _abort 115838->115929 115861 304f73 EnterCriticalSection 115839->115861 115843 308adb 115930 3026cc 19 API calls _abort 115843->115930 115844 308af1 115847 308b22 115844->115847 115848 308b0d 115844->115848 115862 308b75 115847->115862 115931 3026cc 19 API calls _abort 115848->115931 115851 308ae3 115936 302610 25 API calls pre_c_initialization 115851->115936 115852 308b12 115932 3026b9 19 API calls _abort 115852->115932 115853 308b1d 115933 308b4c LeaveCriticalSection __wsopen_s 115853->115933 115856->115802 115857->115811 115858->115805 115859->115823 115860->115825 115861->115844 115863 308b87 115862->115863 115864 308b9f 115862->115864 115946 3026b9 19 API calls _abort 115863->115946 115866 308f09 115864->115866 115869 308be4 115864->115869 115964 3026b9 19 API calls _abort 115866->115964 115867 308b8c 115947 3026cc 19 API calls _abort 115867->115947 115872 308bef 115869->115872 115873 308b94 115869->115873 115879 308c1f 115869->115879 115871 308f0e 115965 3026cc 19 API calls _abort 115871->115965 115948 3026b9 19 API calls _abort 115872->115948 115873->115853 115876 308bf4 115949 3026cc 19 API calls _abort 115876->115949 115881 308c38 115879->115881 115882 308c7a 115879->115882 115883 308c5e 115879->115883 115880 308bfc 115966 302610 25 API calls pre_c_initialization 115880->115966 115881->115883 115889 308c45 115881->115889 115953 30282e 20 API calls 2 library calls 115882->115953 115950 3026b9 19 API calls _abort 115883->115950 115885 308c63 115951 3026cc 19 API calls _abort 115885->115951 115937 30f74c 115889->115937 115890 308c91 115893 3027f4 _free 19 API calls 115890->115893 115891 308c6a 115952 302610 25 API calls pre_c_initialization 115891->115952 115892 308de3 115895 308e59 115892->115895 115898 308dfc GetConsoleMode 115892->115898 115896 308c9a 115893->115896 115897 308e5d ReadFile 115895->115897 115899 3027f4 _free 19 API calls 115896->115899 115900 308ed1 GetLastError 115897->115900 115901 308e77 115897->115901 115898->115895 115902 308e0d 115898->115902 115903 308ca1 115899->115903 115904 308e35 115900->115904 115905 308ede 115900->115905 115901->115900 115906 308e4e 115901->115906 115902->115897 115907 308e13 ReadConsoleW 115902->115907 115908 308cc6 115903->115908 115909 308cab 115903->115909 115925 308c75 __fread_nolock 115904->115925 115959 302696 19 API calls __dosmaperr 115904->115959 115962 3026cc 19 API calls _abort 115905->115962 115920 308eb3 115906->115920 115921 308e9c 115906->115921 115906->115925 115907->115906 115913 308e2f GetLastError 115907->115913 115956 309254 115908->115956 115954 3026cc 19 API calls _abort 115909->115954 115913->115904 115914 3027f4 _free 19 API calls 115914->115873 115915 308cb0 115955 3026b9 19 API calls _abort 115915->115955 115916 308ee3 115963 3026b9 19 API calls _abort 115916->115963 115923 308eca 115920->115923 115920->115925 115960 308891 30 API calls 3 library calls 115921->115960 115961 3086d1 28 API calls __wsopen_s 115923->115961 115925->115914 115926 308ecf 115926->115925 115927->115832 115928->115837 115929->115843 115930->115851 115931->115852 115932->115853 115933->115837 115934->115836 115935->115851 115936->115837 115938 30f766 115937->115938 115939 30f759 115937->115939 115941 30f772 115938->115941 115968 3026cc 19 API calls _abort 115938->115968 115967 3026cc 19 API calls _abort 115939->115967 115941->115892 115943 30f75e 115943->115892 115944 30f793 115969 302610 25 API calls pre_c_initialization 115944->115969 115946->115867 115947->115873 115948->115876 115949->115880 115950->115885 115951->115891 115952->115925 115953->115890 115954->115915 115955->115925 115970 3091bb 115956->115970 115959->115925 115960->115925 115961->115926 115962->115916 115963->115925 115964->115871 115965->115880 115966->115873 115967->115943 115968->115944 115969->115943 115971 3051f2 __wsopen_s 25 API calls 115970->115971 115972 3091cd 115971->115972 115973 3091d5 115972->115973 115974 3091e6 SetFilePointerEx 115972->115974 115979 3026cc 19 API calls _abort 115973->115979 115975 3091da 115974->115975 115976 3091fe GetLastError 115974->115976 115975->115889 115980 302696 19 API calls __dosmaperr 115976->115980 115979->115975 115980->115975 115981 31872d 115985 32fed5 115981->115985 115983 318738 115984 32fed5 52 API calls 115983->115984 115984->115983 115986 32ff0f 115985->115986 115990 32fee2 115985->115990 115986->115983 115987 32ff11 115997 2d2b69 52 API calls 115987->115997 115988 32ff16 115991 2d304c 52 API calls 115988->115991 115990->115986 115990->115987 115990->115988 115994 32ff09 115990->115994 115992 32ff1d 115991->115992 115993 2df78e 21 API calls 115992->115993 115993->115986 115996 2d2df0 38 API calls _wcsstr 115994->115996 115996->115986 115997->115988 117997 2f0a12 117998 2f0a1e ___scrt_is_nonwritable_in_current_image 117997->117998 118027 2f04e7 117998->118027 118000 2f0a25 118001 2f0b6d 118000->118001 118004 2f0a4f 118000->118004 118065 2f0e4d IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 118001->118065 118003 2f0b74 118066 2f4d5e 27 API calls _abort 118003->118066 118011 2f0a8e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 118004->118011 118038 3022a1 118004->118038 118006 2f0b7a 118067 2f4d10 27 API calls _abort 118006->118067 118009 2f0b82 118014 2f0aee 118011->118014 118061 2f4d26 37 API calls 2 library calls 118011->118061 118013 2f0a6e ___scrt_is_nonwritable_in_current_image 118046 2f0f69 118014->118046 118016 2f0af4 118050 2efc28 118016->118050 118021 2f0b10 118021->118003 118022 2f0b14 118021->118022 118023 2f0b1d 118022->118023 118063 2f4d01 27 API calls _abort 118022->118063 118064 2f0671 13 API calls 2 library calls 118023->118064 118026 2f0b25 118026->118013 118028 2f04f0 118027->118028 118068 2f0ca4 IsProcessorFeaturePresent 118028->118068 118030 2f04fc 118069 2f3ed4 10 API calls 3 library calls 118030->118069 118032 2f0501 118037 2f0505 118032->118037 118070 30213b 118032->118070 118035 2f051c 118035->118000 118037->118000 118039 3022b8 118038->118039 118040 2f11dd _ValidateLocalCookies 5 API calls 118039->118040 118041 2f0a68 118040->118041 118041->118013 118042 302245 118041->118042 118044 302274 118042->118044 118043 2f11dd _ValidateLocalCookies 5 API calls 118045 30229d 118043->118045 118044->118043 118045->118011 118121 2f3580 118046->118121 118049 2f0f8f 118049->118016 118051 2efc34 IsThemeActive 118050->118051 118052 2efc8f 118050->118052 118123 2f4e6e 118051->118123 118062 2f4c35 GetModuleHandleW 118052->118062 118054 2efc5f 118129 2f4ed4 118054->118129 118056 2efc66 118136 2efc98 SystemParametersInfoW SystemParametersInfoW 118056->118136 118058 2efc6d 118137 2e2d33 118058->118137 118061->118014 118062->118021 118063->118023 118064->118026 118065->118003 118066->118006 118067->118009 118068->118030 118069->118032 118074 30d026 118070->118074 118073 2f3efd 8 API calls 3 library calls 118073->118037 118076 30d03f 118074->118076 118078 30d043 118074->118078 118092 2f11dd 118076->118092 118077 2f050e 118077->118035 118077->118073 118078->118076 118080 304a84 118078->118080 118081 304a90 ___scrt_is_nonwritable_in_current_image 118080->118081 118099 302e35 EnterCriticalSection 118081->118099 118083 304a97 118100 304edb 118083->118100 118085 304aa6 118086 304ab5 118085->118086 118113 304918 28 API calls 118085->118113 118115 304ad1 LeaveCriticalSection _abort 118086->118115 118089 304ab0 118114 3049ce GetStdHandle GetFileType 118089->118114 118090 304ac6 ___scrt_is_nonwritable_in_current_image 118090->118078 118093 2f11e8 IsProcessorFeaturePresent 118092->118093 118094 2f11e6 118092->118094 118096 2f122a 118093->118096 118094->118077 118120 2f11ee SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 118096->118120 118098 2f130d 118098->118077 118099->118083 118101 304ee7 ___scrt_is_nonwritable_in_current_image 118100->118101 118102 304ef4 118101->118102 118103 304f0b 118101->118103 118117 3026cc 19 API calls _abort 118102->118117 118116 302e35 EnterCriticalSection 118103->118116 118106 304ef9 118118 302610 25 API calls pre_c_initialization 118106->118118 118108 304f43 118119 304f6a LeaveCriticalSection _abort 118108->118119 118109 304f03 ___scrt_is_nonwritable_in_current_image 118109->118085 118111 304e2c __wsopen_s 20 API calls 118112 304f17 118111->118112 118112->118108 118112->118111 118113->118089 118114->118086 118115->118090 118116->118112 118117->118106 118118->118109 118119->118109 118120->118098 118122 2f0f7c GetStartupInfoW 118121->118122 118122->118049 118124 2f4e7a ___scrt_is_nonwritable_in_current_image 118123->118124 118186 302e35 EnterCriticalSection 118124->118186 118126 2f4e85 pre_c_initialization 118187 2f4ec5 118126->118187 118128 2f4eba ___scrt_is_nonwritable_in_current_image 118128->118054 118130 2f4efa 118129->118130 118131 2f4ee0 118129->118131 118130->118056 118131->118130 118191 3026cc 19 API calls _abort 118131->118191 118133 2f4eea 118192 302610 25 API calls pre_c_initialization 118133->118192 118135 2f4ef5 118135->118056 118136->118058 118138 2e2d43 __wsopen_s 118137->118138 118139 2df38f 21 API calls 118138->118139 118140 2e2d4f GetCurrentDirectoryW 118139->118140 118193 2e2a5e 118140->118193 118186->118126 118190 302e7d LeaveCriticalSection 118187->118190 118189 2f4ecc 118189->118128 118190->118189 118191->118133 118192->118135 118194 2df38f 21 API calls 118193->118194 118195 2e2a74 118194->118195 118301 2e2f4b 118195->118301 118197 2e2a92 118198 2df9fa 21 API calls 118197->118198 118199 2e2aa6 118198->118199 118200 2dfbc8 21 API calls 118199->118200 118201 2e2ab1 118200->118201 118315 2d2ae3 118201->118315 118204 2dfa3b 21 API calls 118205 2e2aca 118204->118205 118206 2d1d83 39 API calls 118205->118206 118302 2e2f58 __wsopen_s 118301->118302 118303 2df82c 21 API calls 118302->118303 118304 2e2f8a 118302->118304 118303->118304 118305 2df6ad 21 API calls 118304->118305 118313 2e2fc0 118304->118313 118305->118304 118306 2dfa3b 21 API calls 118307 2e30b7 118306->118307 118309 2e2608 21 API calls 118307->118309 118308 2dfa3b 21 API calls 118308->118313 118311 2e30c3 118309->118311 118310 2df6ad 21 API calls 118310->118313 118311->118197 118312 2e2608 21 API calls 118312->118313 118313->118308 118313->118310 118313->118312 118314 2e308e 118313->118314 118314->118306 118314->118311 118316 2f042b 21 API calls 118315->118316 118317 2d2af1 118316->118317 118317->118204 115998 2d1033 116003 2e4e91 115998->116003 116002 2d1042 116004 2df38f 21 API calls 116003->116004 116005 2e4eff 116004->116005 116011 2e5c52 116005->116011 116007 2e4f9c 116009 2d1038 116007->116009 116014 2e5bc6 21 API calls __fread_nolock 116007->116014 116010 2f06d4 28 API calls __onexit 116009->116010 116010->116002 116015 2e5c80 116011->116015 116014->116007 116016 2e5c71 116015->116016 116017 2e5c8d 116015->116017 116016->116007 116017->116016 116018 2e5c94 RegOpenKeyExW 116017->116018 116018->116016 116019 2e5cae RegQueryValueExW 116018->116019 116020 2e5ccf 116019->116020 116021 2e5ce4 RegCloseKey 116019->116021 116020->116021 116021->116016 116022 31362f 116059 2d42e9 ISource __fread_nolock 116022->116059 116023 2d46c6 116212 344358 81 API calls __wsopen_s 116023->116212 116025 3143d3 116026 2d3713 116026->116023 116027 2d376c 116026->116027 116032 2d3c35 ISource 116026->116032 116027->116023 116044 2d37a6 ISource 116027->116044 116028 2dfbc8 21 API calls 116028->116059 116029 2d415b 116031 2f042b 21 API calls 116029->116031 116030 2d4887 116035 313cef 116030->116035 116037 2d37bc ISource 116030->116037 116030->116044 116031->116044 116032->116029 116032->116030 116032->116044 116035->116037 116040 2dfbc8 21 API calls 116035->116040 116039 2dfbc8 21 API calls 116039->116044 116040->116037 116042 2dfa3b 21 API calls 116042->116059 116044->116037 116044->116039 116046 3141a4 116207 344358 81 API calls __wsopen_s 116046->116207 116049 3141b7 116211 32ff7d 21 API calls 116049->116211 116050 3141c5 116208 344358 81 API calls __wsopen_s 116050->116208 116051 2f042b 21 API calls 116051->116059 116052 2e5eb0 9 API calls 116052->116059 116053 2f045b 21 API calls 116053->116059 116055 3141d7 116209 32ff7d 21 API calls 116055->116209 116058 3135b9 116210 344358 81 API calls __wsopen_s 116058->116210 116059->116023 116059->116026 116059->116028 116059->116042 116059->116046 116059->116049 116059->116050 116059->116051 116059->116052 116059->116053 116059->116058 116066 34fc5b 85 API calls 116059->116066 116067 2e174b 116059->116067 116071 35a545 116059->116071 116077 359f7b 116059->116077 116080 35a943 116059->116080 116088 347efb 116059->116088 116143 2dbfa2 116059->116143 116200 2d3574 21 API calls 116059->116200 116201 2d914c 93 API calls 116059->116201 116202 341e7c 21 API calls 116059->116202 116203 2f0854 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 116059->116203 116204 2f080a EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 116059->116204 116205 357c74 165 API calls 116059->116205 116206 32ff7d 21 API calls 116059->116206 116066->116059 116068 2e1754 116067->116068 116069 2e1761 116067->116069 116213 2e1cf6 116068->116213 116069->116059 116073 35a558 116071->116073 116072 2d304c 52 API calls 116074 35a5c5 116072->116074 116073->116072 116076 35a567 116073->116076 116219 341c68 116074->116219 116076->116059 116263 358974 116077->116263 116079 359f8b 116079->116059 116081 35a99f 116080->116081 116083 35a95f 116080->116083 116082 2d334c 38 API calls 116081->116082 116084 35a9bf 116081->116084 116082->116084 116083->116059 116084->116083 116085 2d334c 38 API calls 116084->116085 116086 35aa27 116084->116086 116085->116086 116375 340815 116086->116375 116089 347f1a 116088->116089 116090 347f25 116088->116090 116091 2d334c 38 API calls 116089->116091 116092 34800b 116090->116092 116095 2df38f 21 API calls 116090->116095 116091->116090 116093 2f042b 21 API calls 116092->116093 116133 34813d 116092->116133 116094 34803e 116093->116094 116096 2f045b 21 API calls 116094->116096 116097 347f46 116095->116097 116098 34804f 116096->116098 116099 2df38f 21 API calls 116097->116099 116450 2e1ebe 116098->116450 116101 347f4f 116099->116101 116102 2d304c 52 API calls 116101->116102 116104 347f5b 116102->116104 116462 2d11ef 21 API calls 116104->116462 116105 2df38f 21 API calls 116107 348062 116105->116107 116109 2e1ebe CloseHandle 116107->116109 116108 347f70 116110 2df78e 21 API calls 116108->116110 116111 348069 116109->116111 116112 347fa3 116110->116112 116113 2d304c 52 API calls 116111->116113 116114 348001 116112->116114 116115 347faa 116112->116115 116116 348075 116113->116116 116119 2d334c 38 API calls 116114->116119 116463 33e9ba GetFileAttributesW FindFirstFileW FindClose 116115->116463 116118 2e1ebe CloseHandle 116116->116118 116121 34807f 116118->116121 116119->116092 116120 347fb3 116120->116114 116123 2dfa3b 21 API calls 116120->116123 116454 2e1ee8 116121->116454 116125 347fca 116123->116125 116464 33e098 25 API calls 116125->116464 116126 348195 GetLastError 116129 3481ae 116126->116129 116127 3480a1 116465 2e1bb6 26 API calls ISource 116127->116465 116467 2e17cc CloseHandle ISource 116129->116467 116132 347fd3 116132->116114 116133->116059 116134 3480af 116135 2e174b 3 API calls 116134->116135 116139 3480b6 116135->116139 116136 3480fc 116137 2f042b 21 API calls 116136->116137 116140 348130 116137->116140 116138 3480d0 116466 33daab SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 116138->116466 116139->116136 116139->116138 116142 2df38f 21 API calls 116140->116142 116142->116133 116144 2d32c3 21 API calls 116143->116144 116145 2dbfba 116144->116145 116146 2f042b 21 API calls 116145->116146 116150 31b542 116145->116150 116148 2dbfd3 116146->116148 116151 2f045b 21 API calls 116148->116151 116149 2dc04c 116154 2d334c 38 API calls 116149->116154 116159 2dc059 116149->116159 116150->116149 116478 34a7ef 38 API calls 116150->116478 116152 2dbfe4 116151->116152 116153 2e1ebe CloseHandle 116152->116153 116155 2dbfef 116153->116155 116157 31b5a4 116154->116157 116156 2df38f 21 API calls 116155->116156 116158 2dbff7 116156->116158 116157->116159 116160 31b5ac 116157->116160 116162 2e1ebe CloseHandle 116158->116162 116472 2e1dcc SetFilePointerEx SetFilePointerEx SetFilePointerEx 116159->116472 116163 2d334c 38 API calls 116160->116163 116164 2dbffe 116162->116164 116167 2dc060 116163->116167 116165 2d304c 52 API calls 116164->116165 116166 2dc00a 116165->116166 116168 2e1ebe CloseHandle 116166->116168 116170 31b5c1 116167->116170 116171 2dc07a 116167->116171 116169 2dc014 116168->116169 116173 2e1ee8 5 API calls 116169->116173 116174 2f045b 21 API calls 116170->116174 116172 2df38f 21 API calls 116171->116172 116177 2dc082 116172->116177 116175 2dc025 116173->116175 116176 31b5c7 116174->116176 116179 2dc02d 116175->116179 116180 31b53a 116175->116180 116181 31b5db 116176->116181 116468 2e1762 116176->116468 116473 2e1af9 27 API calls 116177->116473 116471 2e1bb6 26 API calls ISource 116179->116471 116477 2e17cc CloseHandle ISource 116180->116477 116183 341c03 21 API calls 116181->116183 116189 31b5df __fread_nolock 116181->116189 116183->116189 116185 2dc091 116185->116189 116474 2d326c 21 API calls 116185->116474 116188 2dc03b 116190 2e174b 3 API calls 116188->116190 116194 2dc042 116190->116194 116191 2dc0a5 116192 2dc0df 116191->116192 116195 2e1ebe CloseHandle 116191->116195 116192->116059 116193 31b503 116476 33daab SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 116193->116476 116194->116149 116194->116193 116197 2dc0d3 116195->116197 116197->116192 116475 2e17cc CloseHandle ISource 116197->116475 116198 31b51a 116198->116149 116200->116059 116201->116059 116202->116059 116203->116059 116204->116059 116205->116059 116206->116059 116207->116049 116208->116055 116209->116023 116210->116049 116211->116023 116212->116025 116214 2e1d0d 116213->116214 116215 327440 SetFilePointerEx 116214->116215 116216 2e1d96 SetFilePointerEx SetFilePointerEx 116214->116216 116217 32742f 116214->116217 116218 2e1d60 116214->116218 116216->116218 116217->116215 116218->116069 116220 341c75 116219->116220 116221 2f042b 21 API calls 116220->116221 116222 341c7c 116221->116222 116225 340156 116222->116225 116224 341cb6 116224->116076 116226 2dfaa1 21 API calls 116225->116226 116227 340169 CharLowerBuffW 116226->116227 116230 34017c 116227->116230 116228 2df6ad 21 API calls 116228->116230 116229 340186 ___scrt_fastfail 116229->116224 116230->116228 116230->116229 116231 3401ba 116230->116231 116232 3401cc 116231->116232 116258 2df6ad 116231->116258 116233 2f045b 21 API calls 116232->116233 116238 3401fa 116233->116238 116235 34021c 116243 3402af 116235->116243 116238->116235 116261 34008e 21 API calls 116238->116261 116239 340259 116239->116229 116240 2f042b 21 API calls 116239->116240 116241 340273 116240->116241 116242 2f045b 21 API calls 116241->116242 116242->116229 116244 2df38f 21 API calls 116243->116244 116245 3402e1 116244->116245 116246 2df38f 21 API calls 116245->116246 116247 3402ea 116246->116247 116248 2df38f 21 API calls 116247->116248 116254 3402f3 116248->116254 116249 2f62b3 GetStringTypeW 116249->116254 116250 2df82c 21 API calls 116250->116254 116251 2df5c0 21 API calls 116251->116254 116253 3402af 40 API calls 116253->116254 116254->116249 116254->116250 116254->116251 116254->116253 116255 2f61fc 38 API calls 116254->116255 116256 3405b7 116254->116256 116257 2dfbc8 21 API calls 116254->116257 116262 2f62dd GetStringTypeW _strftime 116254->116262 116255->116254 116256->116239 116257->116254 116259 2dfaa1 21 API calls 116258->116259 116260 2df6b8 116259->116260 116260->116232 116261->116238 116262->116254 116264 2d304c 52 API calls 116263->116264 116265 3589ab 116264->116265 116269 3589f0 ISource 116265->116269 116300 3596f4 116265->116300 116267 358a64 116267->116269 116273 2d304c 52 API calls 116267->116273 116287 358c9c 116267->116287 116332 358f38 41 API calls _strftime 116267->116332 116268 358e6a 116349 3598c8 59 API calls 116268->116349 116269->116079 116271 358e79 116272 358caa 116271->116272 116274 358e85 116271->116274 116313 3588a1 116272->116313 116273->116267 116274->116269 116279 358ce3 116328 2f02c0 116279->116328 116282 358d03 116333 344358 81 API calls __wsopen_s 116282->116333 116283 358d1d 116334 2d2b1f 116283->116334 116286 358d0e GetCurrentProcess TerminateProcess 116286->116283 116287->116268 116287->116272 116292 358ee0 116292->116269 116296 358ef4 FreeLibrary 116292->116296 116293 358d5c 116346 359598 75 API calls 116293->116346 116296->116269 116298 358d6d 116298->116292 116347 2d2510 21 API calls 116298->116347 116348 2d3574 21 API calls 116298->116348 116350 359598 75 API calls 116298->116350 116301 2dfaa1 21 API calls 116300->116301 116302 359711 CharLowerBuffW 116301->116302 116351 339d33 116302->116351 116306 2df38f 21 API calls 116307 35974d 116306->116307 116358 2df4fe 21 API calls __fread_nolock 116307->116358 116309 359761 116310 2df9a0 21 API calls 116309->116310 116311 35976b _wcslen 116310->116311 116312 359866 _wcslen 116311->116312 116359 358f38 41 API calls _strftime 116311->116359 116312->116267 116314 3588bc 116313->116314 116315 358907 116313->116315 116316 2f045b 21 API calls 116314->116316 116319 359a7c 116315->116319 116317 3588de 116316->116317 116317->116315 116318 2f042b 21 API calls 116317->116318 116318->116317 116320 359c95 ISource 116319->116320 116322 359aa0 _strcat _wcslen 116319->116322 116320->116279 116321 2d33b0 38 API calls 116321->116322 116322->116320 116322->116321 116323 2d3400 38 API calls 116322->116323 116324 2d334c 38 API calls 116322->116324 116325 2d304c 52 API calls 116322->116325 116326 2fe8ac 20 API calls ___std_exception_copy 116322->116326 116362 33fe37 23 API calls _wcslen 116322->116362 116323->116322 116324->116322 116325->116322 116326->116322 116329 2f02d5 116328->116329 116330 2f036d EnumWindows 116329->116330 116331 2f033b 116329->116331 116330->116331 116331->116282 116331->116283 116332->116267 116333->116286 116335 2d2b27 116334->116335 116336 2f042b 21 API calls 116335->116336 116337 2d2b35 116336->116337 116363 2d2a2a 116337->116363 116340 2d2830 116366 2d2940 116340->116366 116342 2d2840 116343 2f045b 21 API calls 116342->116343 116344 2d28d8 116342->116344 116343->116344 116344->116298 116345 2d2510 21 API calls 116344->116345 116345->116293 116346->116298 116347->116298 116348->116298 116349->116271 116350->116298 116352 339d53 _wcslen 116351->116352 116353 339d92 116352->116353 116356 339e4a 116352->116356 116357 339d88 116352->116357 116353->116306 116353->116311 116356->116353 116361 2df577 40 API calls 116356->116361 116357->116353 116360 2df577 40 API calls 116357->116360 116358->116309 116359->116312 116360->116357 116361->116356 116362->116322 116364 2f042b 21 API calls 116363->116364 116365 2d2a37 116364->116365 116365->116340 116367 2d294d 116366->116367 116368 3129e7 116367->116368 116373 2d2957 ISource 116367->116373 116369 2f042b 21 API calls 116368->116369 116370 3129f6 116369->116370 116371 2d295e 116371->116342 116373->116371 116374 2d3490 21 API calls ISource 116373->116374 116374->116373 116408 34074d 52 API calls _strftime 116375->116408 116377 340834 116378 340896 116377->116378 116379 3408ae 116377->116379 116401 34083a __fread_nolock 116377->116401 116409 340a92 56 API calls __fread_nolock 116378->116409 116381 340921 116379->116381 116382 340918 116379->116382 116385 3408cb 116379->116385 116383 340953 116381->116383 116384 3409b9 116381->116384 116381->116401 116382->116381 116388 3408ff 116382->116388 116389 340983 116383->116389 116390 340958 116383->116390 116386 3409c2 116384->116386 116387 340a59 116384->116387 116410 342bf2 116385->116410 116392 3409c7 116386->116392 116393 340a38 116386->116393 116387->116401 116428 2d3400 38 API calls 116387->116428 116414 341c03 116388->116414 116389->116401 116424 2d33b0 38 API calls 116389->116424 116390->116401 116423 2d33b0 38 API calls 116390->116423 116394 340a06 116392->116394 116395 3409cd 116392->116395 116393->116401 116427 2d3400 38 API calls 116393->116427 116394->116401 116426 2d3400 38 API calls 116394->116426 116395->116401 116425 2d3400 38 API calls 116395->116425 116401->116083 116404 3408d3 116405 342bf2 23 API calls 116404->116405 116406 3408ea __fread_nolock 116405->116406 116407 342bf2 23 API calls 116406->116407 116407->116388 116408->116377 116409->116401 116411 342c00 116410->116411 116412 342bfb 116410->116412 116411->116404 116429 341ce5 116412->116429 116415 341c0e 116414->116415 116416 2f042b 21 API calls 116415->116416 116417 341c15 116416->116417 116418 341c21 116417->116418 116419 341c42 116417->116419 116420 2f045b 21 API calls 116418->116420 116421 2f045b 21 API calls 116419->116421 116422 341c2a ___scrt_fastfail 116420->116422 116421->116422 116422->116401 116423->116401 116424->116401 116425->116401 116426->116401 116427->116401 116428->116401 116430 341cfc 116429->116430 116443 341e15 116429->116443 116431 341d1c 116430->116431 116433 341d49 116430->116433 116434 341d60 116430->116434 116431->116433 116436 341d30 116431->116436 116432 2f045b 21 API calls 116447 341d3e __fread_nolock 116432->116447 116433->116432 116437 2f045b 21 API calls 116434->116437 116444 341d7d 116434->116444 116435 341da4 116438 2f045b 21 API calls 116435->116438 116439 2f045b 21 API calls 116436->116439 116437->116444 116440 341daa 116438->116440 116439->116447 116448 3419fa 21 API calls 116440->116448 116441 2f042b 21 API calls 116441->116443 116443->116411 116444->116435 116444->116436 116444->116447 116445 341db6 116449 2f00d3 23 API calls 116445->116449 116447->116441 116448->116445 116449->116447 116451 2e1ec8 116450->116451 116452 2e1ed7 116450->116452 116451->116105 116452->116451 116453 2e1edc CloseHandle 116452->116453 116453->116451 116455 2e1eff CreateFileW 116454->116455 116456 327466 116454->116456 116459 2e1f1e 116455->116459 116457 32746c CreateFileW 116456->116457 116456->116459 116458 327494 116457->116458 116457->116459 116460 2e1cf6 3 API calls 116458->116460 116459->116126 116459->116127 116461 32749f 116460->116461 116461->116459 116462->116108 116463->116120 116464->116132 116465->116134 116466->116136 116467->116133 116479 2e1e10 116468->116479 116471->116188 116472->116167 116473->116185 116474->116191 116475->116192 116476->116198 116477->116150 116478->116150 116480 2e1e8d SetFilePointerEx 116479->116480 116481 2e1e21 116479->116481 116480->116481 116482 2e1773 116481->116482 116483 2e1e5e ReadFile 116481->116483 116482->116181 116483->116481 116483->116482 118889 e79519 118890 e79541 118889->118890 118891 e7952e 118889->118891 118893 e79562 118890->118893 118894 e79558 RtlEnterCriticalSection 118890->118894 118918 e78735 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 118891->118918 118905 e79315 13 API calls 118893->118905 118894->118893 118896 e79533 118896->118890 118898 e79537 118896->118898 118897 e7956b 118899 e7956f 118897->118899 118906 e78f91 118897->118906 118901 e795c7 RtlLeaveCriticalSection 118899->118901 118902 e795d1 118899->118902 118901->118902 118903 e7957b 118903->118899 118919 e7913d 9 API calls 118903->118919 118905->118897 118907 e78fa3 118906->118907 118908 e78fac 118906->118908 118926 e78735 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 118907->118926 118910 e78fd5 RtlEnterCriticalSection 118908->118910 118912 e78fdf 118908->118912 118915 e78fb4 118908->118915 118910->118912 118911 e78fa8 118911->118908 118911->118915 118912->118915 118920 e78e49 118912->118920 118915->118903 118916 e79122 RtlLeaveCriticalSection 118917 e7912c 118916->118917 118917->118903 118918->118896 118919->118899 118923 e78e60 118920->118923 118921 e78ea1 118925 e78ec8 118921->118925 118932 e78be1 118921->118932 118923->118921 118923->118925 118927 e78db1 118923->118927 118925->118916 118925->118917 118926->118911 118936 e784b5 118927->118936 118929 e78dc1 118930 e78dce 118929->118930 118945 e78d25 9 API calls 118929->118945 118930->118923 118933 e78c06 118932->118933 118934 e78c7c 118932->118934 118933->118925 118934->118933 118964 e78b25 118934->118964 118939 e784d3 118936->118939 118938 e784e1 118946 e78339 118938->118946 118939->118938 118941 e784ef 118939->118941 118943 e78541 118939->118943 118950 e78195 118939->118950 118958 e78049 LocalAlloc 118939->118958 118941->118929 118959 e78271 118943->118959 118945->118930 118947 e7838c 118946->118947 118948 e783c2 VirtualAlloc 118947->118948 118949 e783db 118947->118949 118948->118947 118948->118949 118949->118941 118951 e781a4 VirtualAlloc 118950->118951 118953 e781f4 118951->118953 118954 e781d1 118951->118954 118953->118939 118963 e77fb9 LocalAlloc 118954->118963 118956 e781dd 118956->118953 118957 e781e1 VirtualFree 118956->118957 118957->118953 118958->118939 118962 e7829f 118959->118962 118960 e78313 118960->118941 118961 e782dd VirtualFree 118961->118962 118962->118960 118962->118961 118963->118956 118966 e78b39 118964->118966 118965 e78bd5 118965->118933 118966->118965 118967 e78b87 118966->118967 118968 e78b71 118966->118968 118969 e786a1 3 API calls 118967->118969 118977 e786a1 118968->118977 118971 e78b85 118969->118971 118971->118965 118987 e789e5 9 API calls 118971->118987 118973 e78ba8 118974 e78bca 118973->118974 118988 e78a45 9 API calls 118973->118988 118989 e780d1 LocalAlloc 118974->118989 118978 e786cb 118977->118978 118979 e78728 118977->118979 118990 e783f9 118978->118990 118979->118971 118983 e786ec 118984 e78703 118983->118984 118985 e78271 VirtualFree 118983->118985 118984->118979 118995 e780d1 LocalAlloc 118984->118995 118985->118984 118987->118973 118988->118974 118989->118965 118993 e7844a 118990->118993 118991 e784ab 118994 e78049 LocalAlloc 118991->118994 118992 e7847c VirtualFree 118992->118993 118993->118991 118993->118992 118994->118983 118995->118979 118996 e8d397 LdrInitializeThunk

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00E7C0C8
                                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00E7C0E6
                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00E7C104
                                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00E7C122
                                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,00E7C1B1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00E7C16B
                                                                                  • RegQueryValueExA.ADVAPI32(?,00E7C32D,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,00E7C1B1,?,80000001), ref: 00E7C189
                                                                                  • RegCloseKey.ADVAPI32(?,00E7C1B8,00000000,00000000,00000005,00000000,00E7C1B1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00E7C1AB
                                                                                  • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00E7C1C8
                                                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 00E7C1D5
                                                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 00E7C1DB
                                                                                  • lstrlen.KERNEL32(00000000), ref: 00E7C206
                                                                                  • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 00E7C25B
                                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C26B
                                                                                  • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 00E7C297
                                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C2A7
                                                                                  • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C2D1
                                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C2E1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                  • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                  • API String ID: 1759228003-2375825460
                                                                                  • Opcode ID: a5458535a20ffe70ae862f14291282f184ff711f039207bc68a654b12c11651b
                                                                                  • Instruction ID: 2fe32294c74d46e38718232ea81e6b009c0e9321cf719279e4d115f2537cd667
                                                                                  • Opcode Fuzzy Hash: a5458535a20ffe70ae862f14291282f184ff711f039207bc68a654b12c11651b
                                                                                  • Instruction Fuzzy Hash: 23614F71A0424E7EEB10DAE4CC46FEF77FC9B08704F5094A9B648F6182DAB4DE448B50

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 855 e7c1b7 856 e7c1b8-e7c1e9 lstrcpyn GetThreadLocale GetLocaleInfoA 855->856 857 e7c1ef-e7c1f3 856->857 858 e7c2e8-e7c2ee 856->858 859 e7c1f5-e7c1f9 857->859 860 e7c1ff-e7c216 lstrlen 857->860 859->858 859->860 861 e7c21b-e7c221 860->861 862 e7c223-e7c22c 861->862 863 e7c22e-e7c237 861->863 862->863 864 e7c218 862->864 863->858 865 e7c23d-e7c244 863->865 864->861 866 e7c246-e7c270 lstrcpyn LoadLibraryExA 865->866 867 e7c272-e7c274 865->867 866->867 867->858 868 e7c276-e7c27a 867->868 868->858 869 e7c27c-e7c2b0 lstrcpyn LoadLibraryExA 868->869 869->858 870 e7c2b2-e7c2e6 lstrcpyn LoadLibraryExA 869->870 870->858
                                                                                  APIs
                                                                                  • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00E7C1C8
                                                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 00E7C1D5
                                                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 00E7C1DB
                                                                                  • lstrlen.KERNEL32(00000000), ref: 00E7C206
                                                                                  • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 00E7C25B
                                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C26B
                                                                                  • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 00E7C297
                                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C2A7
                                                                                  • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C2D1
                                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00E7C2E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                                  • String ID:
                                                                                  • API String ID: 1599918012-0
                                                                                  • Opcode ID: 9761e91035f57e01ffaef065c1ac89d12249611f77cd6e926a4d7ebbac4f4515
                                                                                  • Instruction ID: 3a96d6d2253ce5286d2e0bb93f50dc1c6adb6c019e4d36c19e749cfec6adeecf
                                                                                  • Opcode Fuzzy Hash: 9761e91035f57e01ffaef065c1ac89d12249611f77cd6e926a4d7ebbac4f4515
                                                                                  • Instruction Fuzzy Hash: 33313071E0424E7EEF11DAE8CC89BEF77FC9B18304F5095A5A189F2142DAB8DE458B50
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?), ref: 00E7E5C0
                                                                                  • FindClose.KERNEL32(00000000,00000000,?), ref: 00E7E5CB
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E7E5E4
                                                                                  • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 00E7E5F5
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileTime$Find$CloseDateFirstLocal
                                                                                  • String ID:
                                                                                  • API String ID: 2659516521-0
                                                                                  • Opcode ID: 35532445bcddddf072de4610115932bee76e299e86bdf79fb3123370f2aa134a
                                                                                  • Instruction ID: 7bd837149a773f0bb6b995382b412284bf150fa64dd813bceb362f3db8973c81
                                                                                  • Opcode Fuzzy Hash: 35532445bcddddf072de4610115932bee76e299e86bdf79fb3123370f2aa134a
                                                                                  • Instruction Fuzzy Hash: 93F0F475D0060CA6CB20DAE48D859CEB7EC9B08328F1056A5B52DF2191EB349B444751
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: 74906ca78a5ed234824da2d21b4ef579ad23ae74e18219abc59e4195ec916c3d
                                                                                  • Instruction ID: be68be7296445d1d8c9efe5ed17a0ddc0ed5e3a0c0ce8a40cfea562a1559ef80
                                                                                  • Opcode Fuzzy Hash: 74906ca78a5ed234824da2d21b4ef579ad23ae74e18219abc59e4195ec916c3d
                                                                                  • Instruction Fuzzy Hash: 24A00231445A80DBDE11DB10CB49B09B761FBC0F01F108E64A0464781457785800D941
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchSleepTimeTranslatetime
                                                                                  • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$P3:$P3:$P3:
                                                                                  • API String ID: 1406140084-3322565093
                                                                                  • Opcode ID: 0c740f90f9c55cb599ae162efc4598cdba50506a8514fb80f297a8f8d49b6cfe
                                                                                  • Instruction ID: 3038679e63a26f19aadfd8e2ec457bfe81385512b8431536c6cab5fed5ca75c9
                                                                                  • Opcode Fuzzy Hash: 0c740f90f9c55cb599ae162efc4598cdba50506a8514fb80f297a8f8d49b6cfe
                                                                                  • Instruction Fuzzy Hash: 62521270618342DFD72ACF24C894FAAB7E4BF45304F14851AE59987391DBB4ADA4CB83

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 369 e91b29-e91b78 call e7aff1 * 2 374 e91b7a call e8d3a5 369->374 375 e91b7f-e91b86 369->375 374->375 377 e91b8c-e91b9a 375->377 378 e92115-e92147 call e7ab89 call e7ab65 call e7ab89 375->378 377->378 380 e91ba0-e91bb5 377->380 380->378 381 e91bbb-e91be9 call e90ff9 * 2 380->381 391 e91beb-e91bf1 381->391 392 e91bf3 381->392 393 e91bf9-e91c04 391->393 392->393 394 e91c64-e91c8c call e7b001 CreateProcessA 393->394 395 e91c06-e91c35 call e7b001 * 2 CreateProcessA 393->395 400 e91c8e-e91cac CreateProcessA 394->400 401 e91ce4-e91cf3 call e91981 394->401 395->401 408 e91c3b-e91c59 CreateProcessA 395->408 400->401 403 e91cae-e91cde call e7e7f9 call e7b001 CreateProcessA 400->403 410 e91cf9-e91d3c call e8d7fd call e91711 401->410 411 e920da-e920dc 401->411 403->378 403->401 408->378 412 e91c5f 408->412 422 e91fea-e9201f call e8d7fd 410->422 423 e91d42-e91d59 410->423 415 e920de-e9210b call e8d7fd 411->415 416 e92110 GetTickCount 411->416 412->401 415->416 416->378 430 e9203b-e9203e 422->430 431 e92021-e92036 call e91b29 422->431 424 e91d5b-e91d93 call e8d7fd 423->424 425 e91dd6-e91def call e917ad 423->425 437 e91db8-e91dd4 call e917ad 424->437 438 e91d95-e91db6 call e917ad 424->438 433 e91df4 425->433 435 e9205a-e9207b call e7ae4d call e905c1 430->435 436 e92040-e92055 call e91b29 430->436 431->378 439 e91df7-e91dfb 433->439 435->378 436->378 437->439 438->439 445 e91e1d-e91e21 439->445 446 e91dfd-e91e01 439->446 447 e91e24-e91e26 445->447 452 e91e03-e91e13 call e91775 446->452 453 e91e15-e91e17 446->453 455 e91e2c-e91e6b call e91a85 call e91845 447->455 456 e91f53-e91f89 call e8d7fd 447->456 452->453 463 e91e19-e91e1b 452->463 453->447 475 e91f3a-e91f3e 455->475 476 e91e71-e91e7c 455->476 465 e91f8b-e91fa0 call e91b29 456->465 466 e91fa5-e91fa8 456->466 463->447 465->378 469 e91faa-e91fbf call e91b29 466->469 470 e91fc4-e91fe5 call e7ae4d call e905c1 466->470 469->378 470->378 478 e92080-e920d5 call e8d7fd 475->478 479 e91f44-e91f4e call e7c5ad 475->479 481 e91ead-e91ee7 call e8d7fd call e91711 476->481 482 e91e7e-e91ea8 call e919c1 call e90fed 476->482 478->411 479->478 481->475 495 e91ee9-e91f32 call e91845 call e8d7fd 481->495 482->481 499 e91f37 495->499 499->475
                                                                                  APIs
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,H!), ref: 00E91C2E
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,H!,00000000,00000000,00000000,00000000,00000000,00000004), ref: 00E91C52
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,H!), ref: 00E91C85
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,H!,00000000,00000000,00000000,00000000,00000000,00000004), ref: 00E91CA5
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,H!,00000000,00000000,00000000,00000000,00000000,00000004), ref: 00E91CD7
                                                                                    • Part of subcall function 00E8D7FD: GetTickCount.KERNEL32 ref: 00E8D876
                                                                                    • Part of subcall function 00E905C1: MessageBoxA.USER32(00000000,00000000,00E90621,00040040), ref: 00E905F4
                                                                                  • GetTickCount.KERNEL32 ref: 00E92110
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateProcess$CountTick$Message
                                                                                  • String ID: execution failure, try to assign other file path$D$H!$NtFreeVirtualMemory$NtGetContextThread$NtResumeThread$NtSetContextThread$NtTerminateProcess$NtUnmapViewOfSection
                                                                                  • API String ID: 2713535555-3865950563
                                                                                  • Opcode ID: 1b7010f30dd5f5969989966a52de71225728cf56ffba3eda9ed07148b2ba8938
                                                                                  • Instruction ID: 3a2fca8a20fc002ef4ab4100d59ea7593489bd300fa1d3b1f151fc6d8758e24b
                                                                                  • Opcode Fuzzy Hash: 1b7010f30dd5f5969989966a52de71225728cf56ffba3eda9ed07148b2ba8938
                                                                                  • Instruction Fuzzy Hash: C912CC70A40219AFDF60DBA9CC82FDEB7F9AB08704F145095F658F7281D771AE848B61

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 500 2e310d-2e317c call 2df38f GetVersionExW call 2df82c 505 327ad9-327aec 500->505 506 2e3182 500->506 508 327aed-327af1 505->508 507 2e3184-2e3186 506->507 509 2e318c-2e31e6 call 2df9a0 call 2df433 507->509 510 327b18 507->510 511 327af3 508->511 512 327af4-327b00 508->512 525 2e31ec-2e31ee 509->525 526 327c2f-327c36 509->526 515 327b1f-327b2b 510->515 511->512 512->508 514 327b02-327b04 512->514 514->507 517 327b0a-327b11 514->517 518 2e324c-2e3266 GetCurrentProcess IsWow64Process 515->518 517->505 520 327b13 517->520 522 2e3268 518->522 523 2e32c7-2e32cd 518->523 520->510 524 2e326e-2e327a 522->524 523->524 527 327c74-327c78 GetSystemInfo 524->527 528 2e3280-2e328f LoadLibraryA 524->528 531 327b30-327b43 525->531 532 2e31f4-2e31f7 525->532 529 327c56-327c59 526->529 530 327c38 526->530 533 2e32cf-2e32d9 GetSystemInfo 528->533 534 2e3291-2e329f GetProcAddress 528->534 538 327c44-327c4c 529->538 539 327c5b-327c6a 529->539 537 327c3e 530->537 535 327b45-327b4e 531->535 536 327b6c-327b6e 531->536 532->518 540 2e31f9-2e3235 532->540 544 2e32a7-2e32a9 533->544 534->533 541 2e32a1-2e32a5 GetNativeSystemInfo 534->541 542 327b50-327b56 535->542 543 327b5b-327b67 535->543 545 327ba3-327ba6 536->545 546 327b70-327b85 536->546 537->538 538->529 539->537 547 327c6c-327c72 539->547 540->518 548 2e3237-2e3240 540->548 541->544 542->518 543->518 549 2e32ab-2e32ac FreeLibrary 544->549 550 2e32b2-2e32c6 544->550 553 327be1-327be4 545->553 554 327ba8-327bc3 545->554 551 327b92-327b9e 546->551 552 327b87-327b8d 546->552 547->538 548->515 555 2e3246 548->555 549->550 551->518 552->518 553->518 556 327bea-327c11 553->556 557 327bd0-327bdc 554->557 558 327bc5-327bcb 554->558 555->518 559 327c13-327c19 556->559 560 327c1e-327c2a 556->560 557->518 558->518 559->518 560->518
                                                                                  APIs
                                                                                  • GetVersionExW.KERNEL32(?), ref: 002E313C
                                                                                    • Part of subcall function 002DF82C: _wcslen.LIBCMT ref: 002DF83F
                                                                                  • GetCurrentProcess.KERNEL32(?,0036D9B8,00000000,?,?), ref: 002E3253
                                                                                  • IsWow64Process.KERNEL32(00000000,?,?), ref: 002E325A
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 002E3285
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 002E3297
                                                                                  • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 002E32A5
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 002E32AC
                                                                                  • GetSystemInfo.KERNEL32(?,?,?), ref: 002E32D3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                  • String ID: GetNativeSystemInfo$`#:$kernel32.dll$l#:$l#:
                                                                                  • API String ID: 3290436268-1819421591
                                                                                  • Opcode ID: a6eb4c1e73646910dcab2dc54969065f0c9c5d32e7b4b311ac66d7d012f3557d
                                                                                  • Instruction ID: 34142b9c3218d8918bd6ca7c7d97f24764b3f45b00f9759810024efdf76a6e5c
                                                                                  • Opcode Fuzzy Hash: a6eb4c1e73646910dcab2dc54969065f0c9c5d32e7b4b311ac66d7d012f3557d
                                                                                  • Instruction Fuzzy Hash: 5B91C13A92A3D2DBCF13C77D7C451AB3FAC6B27700F148899D9819B2A1D2688904DB25

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 002E2D63
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 002E2D76
                                                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 002E2DE2
                                                                                    • Part of subcall function 002DF82C: _wcslen.LIBCMT ref: 002DF83F
                                                                                    • Part of subcall function 002DA65C: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 002DA69D
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 002E2E63
                                                                                  • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse user this program.,AutoIt,00000010), ref: 00327988
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 003279C9
                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00391E24), ref: 00327A52
                                                                                  • ShellExecuteW.SHELL32(00000000), ref: 00327A59
                                                                                    • Part of subcall function 002E2C51: GetSysColorBrush.USER32(0000000F), ref: 002E2C5C
                                                                                    • Part of subcall function 002E2C51: LoadCursorW.USER32(00000000,00007F00), ref: 002E2C6B
                                                                                    • Part of subcall function 002E2C51: LoadIconW.USER32(00000063), ref: 002E2C81
                                                                                    • Part of subcall function 002E2C51: LoadIconW.USER32(000000A4), ref: 002E2C93
                                                                                    • Part of subcall function 002E2C51: LoadIconW.USER32(000000A2), ref: 002E2CA5
                                                                                    • Part of subcall function 002E2C51: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 002E2CBD
                                                                                    • Part of subcall function 002E2C51: RegisterClassExW.USER32(?), ref: 002E2D0E
                                                                                    • Part of subcall function 002EFBB7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 002EFBE5
                                                                                    • Part of subcall function 002EFBB7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 002EFC06
                                                                                    • Part of subcall function 002EFBB7: ShowWindow.USER32(00000000), ref: 002EFC1A
                                                                                    • Part of subcall function 002EFBB7: ShowWindow.USER32(00000000), ref: 002EFC23
                                                                                    • Part of subcall function 002E34C7: Shell_NotifyIconW.SHELL32(00000000,?), ref: 002E3598
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                  • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse user this program.$p):$p3:$runas
                                                                                  • API String ID: 683915450-3266765435
                                                                                  • Opcode ID: 968145b3dce47f9e603ba2da89db14e7a484edc545811a810e56c9f1746a4154
                                                                                  • Instruction ID: 3210a54601f0c008d6531a03db3f4010aad9601f9527849365e9558a52a7dcd4
                                                                                  • Opcode Fuzzy Hash: 968145b3dce47f9e603ba2da89db14e7a484edc545811a810e56c9f1746a4154
                                                                                  • Instruction Fuzzy Hash: CE51283565C381AACF03EF65DC559AF7BACAB46700F44042DF582422E2CB64996DCB62

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 002D1155: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF), ref: 002D1173
                                                                                    • Part of subcall function 002EFD48: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,002E0F35), ref: 002EFD6A
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 002E0F78
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00326FEF
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00327030
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00327072
                                                                                  • _wcslen.LIBCMT ref: 003270D9
                                                                                  • _wcslen.LIBCMT ref: 003270E8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\$p3:$|(:
                                                                                  • API String ID: 98802146-1920603704
                                                                                  • Opcode ID: 94f71b000536b4494a8862c0c84b5b282ecdd7c926d896df3740d1c468d9e280
                                                                                  • Instruction ID: 278caa76b4cf7f3ddb87beae51c7f0bd212d1256e772838adb86424d5fd9e407
                                                                                  • Opcode Fuzzy Hash: 94f71b000536b4494a8862c0c84b5b282ecdd7c926d896df3740d1c468d9e280
                                                                                  • Instruction Fuzzy Hash: ED718B75518301AECB16EF65EC818ABBBECFF4A740F40442EF545872A0EB709A58CF52

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 002E50AD
                                                                                  • RegisterClassExW.USER32(00000030), ref: 002E50D7
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002E50E8
                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 002E5105
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002E5115
                                                                                  • LoadIconW.USER32(000000A9), ref: 002E512B
                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002E513A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                  • API String ID: 2914291525-1005189915
                                                                                  • Opcode ID: 03d12b2dc4e815e378c3fe7925ab2758603ea5044f5a752d6b9decb326a64591
                                                                                  • Instruction ID: 9847375c16c2397ef1619c7aae4be83f646e94c51ea065a3abbb0b579746393a
                                                                                  • Opcode Fuzzy Hash: 03d12b2dc4e815e378c3fe7925ab2758603ea5044f5a752d6b9decb326a64591
                                                                                  • Instruction Fuzzy Hash: 6621DBB5E01318AFDB02DF98EC89BDEBBB8FB09710F00811AF911A62A0D7B545549F95

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 752 e79819-e7982d 753 e79839-e7983f 752->753 754 e79846-e7984b 753->754 755 e79841-e79844 753->755 757 e7984d-e79853 754->757 758 e7985a-e79862 754->758 755->754 756 e7982f-e79837 CharNextA 755->756 756->753 757->758 759 e79855-e79858 757->759 760 e798bf-e798c4 758->760 759->753 761 e798c6-e798e3 call e7b131 760->761 762 e79864-e79869 760->762 770 e79960-e79965 761->770 764 e798ab-e798bd CharNextA 762->764 765 e7986b-e79875 CharNextA 762->765 764->760 767 e7988b-e79891 765->767 768 e79893-e79896 767->768 769 e79898-e7989d 767->769 768->769 771 e79877-e79889 CharNextA 768->771 769->760 772 e7989f-e798a9 CharNextA 769->772 773 e798e5-e798ea 770->773 774 e7996b-e7997c 770->774 771->767 772->760 775 e7993c-e7994a CharNextA 773->775 776 e798ec-e798f6 CharNextA 773->776 775->770 777 e7994c-e7995e 775->777 778 e7991c-e79922 776->778 777->770 777->777 779 e79924-e79927 778->779 780 e79929-e7992e 778->780 779->780 781 e798f8-e79906 CharNextA 779->781 780->770 782 e79930-e7993a CharNextA 780->782 781->778 783 e79908-e7991a 781->783 782->770 783->778 783->783
                                                                                  APIs
                                                                                  • CharNextA.USER32(00000000), ref: 00E7986E
                                                                                  • CharNextA.USER32(00000000,00000000), ref: 00E7987A
                                                                                  • CharNextA.USER32(00000000,00000000), ref: 00E798A2
                                                                                  • CharNextA.USER32(00000000), ref: 00E798AE
                                                                                  • CharNextA.USER32(?,00000000), ref: 00E798EF
                                                                                  • CharNextA.USER32(00000000,?,00000000), ref: 00E798FB
                                                                                  • CharNextA.USER32(00000000,?,00000000), ref: 00E79933
                                                                                  • CharNextA.USER32(?,00000000), ref: 00E7993F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharNext
                                                                                  • String ID: $"$"
                                                                                  • API String ID: 3213498283-938660540
                                                                                  • Opcode ID: a74b84504903bc6848e67ef457c7a6e515321d0edc5c07087f1d644512264336
                                                                                  • Instruction ID: 9cfe7a82720c7c5c8f749e39b82a3b20db72c95092b3c319a8433f50619a1660
                                                                                  • Opcode Fuzzy Hash: a74b84504903bc6848e67ef457c7a6e515321d0edc5c07087f1d644512264336
                                                                                  • Instruction Fuzzy Hash: 6E510674A08286DFE735DFA8C484A66BBE5EF5A340F24984DE5C9EB302D331AC40DB51

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 784 310585-3105b5 call 310359 787 3105d0-3105dc call 30504f 784->787 788 3105b7-3105c2 call 3026b9 784->788 793 3105f5-31063e call 3102c4 787->793 794 3105de-3105f3 call 3026b9 call 3026cc 787->794 795 3105c4-3105cb call 3026cc 788->795 803 310640-310649 793->803 804 3106ab-3106b4 GetFileType 793->804 794->795 805 3108a7-3108ad 795->805 809 310680-3106a6 GetLastError call 302696 803->809 810 31064b-31064f 803->810 806 3106b6-3106e7 GetLastError call 302696 CloseHandle 804->806 807 3106fd-310700 804->807 806->795 821 3106ed-3106f8 call 3026cc 806->821 812 310702-310707 807->812 813 310709-31070f 807->813 809->795 810->809 814 310651-31067e call 3102c4 810->814 817 310713-310761 call 304f98 812->817 813->817 818 310711 813->818 814->804 814->809 827 310771-310795 call 310077 817->827 828 310763-31076f call 3104d5 817->828 818->817 821->795 834 310797 827->834 835 3107a8-3107eb 827->835 828->827 833 310799-3107a3 call 3084de 828->833 833->805 834->833 837 3107ed-3107f1 835->837 838 31080c-31081a 835->838 837->838 840 3107f3-310807 837->840 841 310820-310824 838->841 842 3108a5 838->842 840->838 841->842 843 310826-310859 CloseHandle call 3102c4 841->843 842->805 846 31085b-310887 GetLastError call 302696 call 305161 843->846 847 31088d-3108a1 843->847 846->847 847->842
                                                                                  APIs
                                                                                    • Part of subcall function 003102C4: CreateFileW.KERNELBASE(00000000,00000000,?,0031062E,?,?,00000000,?,0031062E,00000000,0000000C), ref: 003102E1
                                                                                  • GetLastError.KERNEL32 ref: 00310699
                                                                                  • __dosmaperr.LIBCMT ref: 003106A0
                                                                                  • GetFileType.KERNELBASE(00000000), ref: 003106AC
                                                                                  • GetLastError.KERNEL32 ref: 003106B6
                                                                                  • __dosmaperr.LIBCMT ref: 003106BF
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 003106DF
                                                                                  • CloseHandle.KERNEL32(?), ref: 00310829
                                                                                  • GetLastError.KERNEL32 ref: 0031085B
                                                                                  • __dosmaperr.LIBCMT ref: 00310862
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                  • String ID: H
                                                                                  • API String ID: 4237864984-2852464175
                                                                                  • Opcode ID: 3d027bb84a259206e4b3cecd929459272c7c0a5dca62da0bcdacd36f15946640
                                                                                  • Instruction ID: 76d3de1a100498782a340e20f71011f2106115f9952b8efaef1e959be24ec0f5
                                                                                  • Opcode Fuzzy Hash: 3d027bb84a259206e4b3cecd929459272c7c0a5dca62da0bcdacd36f15946640
                                                                                  • Instruction Fuzzy Hash: 7FA14632A041589FDF1EEF68C8957EE7BA5AB0A320F140149F811AF3D1DBB59892CB51

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 002E2C5C
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 002E2C6B
                                                                                  • LoadIconW.USER32(00000063), ref: 002E2C81
                                                                                  • LoadIconW.USER32(000000A4), ref: 002E2C93
                                                                                  • LoadIconW.USER32(000000A2), ref: 002E2CA5
                                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 002E2CBD
                                                                                  • RegisterClassExW.USER32(?), ref: 002E2D0E
                                                                                    • Part of subcall function 002E507A: GetSysColorBrush.USER32(0000000F), ref: 002E50AD
                                                                                    • Part of subcall function 002E507A: RegisterClassExW.USER32(00000030), ref: 002E50D7
                                                                                    • Part of subcall function 002E507A: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002E50E8
                                                                                    • Part of subcall function 002E507A: InitCommonControlsEx.COMCTL32(?), ref: 002E5105
                                                                                    • Part of subcall function 002E507A: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002E5115
                                                                                    • Part of subcall function 002E507A: LoadIconW.USER32(000000A9), ref: 002E512B
                                                                                    • Part of subcall function 002E507A: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 002E513A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                  • String ID: #$0$AutoIt v3
                                                                                  • API String ID: 423443420-4155596026
                                                                                  • Opcode ID: bd3603a3cdb0ca6ff80b05f294d3154a05cd2d643f54760f75a41f492de98aa6
                                                                                  • Instruction ID: ad71971226f27b2eddc2fef2518e9f981afa52c8c1d8c05514db66ded6387cbc
                                                                                  • Opcode Fuzzy Hash: bd3603a3cdb0ca6ff80b05f294d3154a05cd2d643f54760f75a41f492de98aa6
                                                                                  • Instruction Fuzzy Hash: 5221E078E50318AFDF129FA9EC45B9ABFB8FB4A710F00402AF504A62E0D7B64550CF95

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 914 308b75-308b85 915 308b87-308b9a call 3026b9 call 3026cc 914->915 916 308b9f-308ba1 914->916 933 308f21 915->933 918 308ba7-308bad 916->918 919 308f09-308f16 call 3026b9 call 3026cc 916->919 918->919 920 308bb3-308bde 918->920 935 308f1c call 302610 919->935 920->919 923 308be4-308bed 920->923 926 308c07-308c09 923->926 927 308bef-308c02 call 3026b9 call 3026cc 923->927 931 308f05-308f07 926->931 932 308c0f-308c13 926->932 927->935 936 308f24-308f29 931->936 932->931 938 308c19-308c1d 932->938 933->936 935->933 938->927 941 308c1f-308c36 938->941 943 308c53-308c5c 941->943 944 308c38-308c3b 941->944 947 308c7a-308c84 943->947 948 308c5e-308c75 call 3026b9 call 3026cc call 302610 943->948 945 308c45-308c4e 944->945 946 308c3d-308c43 944->946 952 308cef-308d09 945->952 946->945 946->948 950 308c86-308c88 947->950 951 308c8b-308ca9 call 30282e call 3027f4 * 2 947->951 977 308e3c 948->977 950->951 987 308cc6-308cec call 309254 951->987 988 308cab-308cc1 call 3026cc call 3026b9 951->988 954 308ddd-308de6 call 30f74c 952->954 955 308d0f-308d1f 952->955 966 308de8-308dfa 954->966 967 308e59 954->967 955->954 959 308d25-308d27 955->959 959->954 963 308d2d-308d53 959->963 963->954 968 308d59-308d6c 963->968 966->967 972 308dfc-308e0b GetConsoleMode 966->972 970 308e5d-308e75 ReadFile 967->970 968->954 973 308d6e-308d70 968->973 975 308ed1-308edc GetLastError 970->975 976 308e77-308e7d 970->976 972->967 978 308e0d-308e11 972->978 973->954 979 308d72-308d9d 973->979 981 308ef5-308ef8 975->981 982 308ede-308ef0 call 3026cc call 3026b9 975->982 976->975 983 308e7f 976->983 985 308e3f-308e49 call 3027f4 977->985 978->970 984 308e13-308e2d ReadConsoleW 978->984 979->954 986 308d9f-308db2 979->986 995 308e35-308e3b call 302696 981->995 996 308efe-308f00 981->996 982->977 991 308e82-308e94 983->991 993 308e4e-308e57 984->993 994 308e2f GetLastError 984->994 985->936 986->954 998 308db4-308db6 986->998 987->952 988->977 991->985 1002 308e96-308e9a 991->1002 993->991 994->995 995->977 996->985 998->954 999 308db8-308dd8 998->999 999->954 1008 308eb3-308ebe 1002->1008 1009 308e9c-308eac call 308891 1002->1009 1014 308ec0 call 3089e1 1008->1014 1015 308eca-308ecf call 3086d1 1008->1015 1020 308eaf-308eb1 1009->1020 1021 308ec5-308ec8 1014->1021 1015->1021 1020->985 1021->1020
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3d5e1f335149c1f65408a0597064813debf222847bf43fdbe44d87848491aaad
                                                                                  • Instruction ID: 155ac3901e73285aaecf311035c1726d280893f2854a14ac3bf7a74eefe54ae6
                                                                                  • Opcode Fuzzy Hash: 3d5e1f335149c1f65408a0597064813debf222847bf43fdbe44d87848491aaad
                                                                                  • Instruction Fuzzy Hash: 74C11570E06349AFDF13DFA8D864BAEBBB4AF1A300F150144E590AB3D2CB749941CB60

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,Executing manually will not work,00E94551,00000000), ref: 00E94312
                                                                                  • MessageBoxA.USER32(00000000,no data,00E94551,00000000), ref: 00E9438A
                                                                                  • GetTickCount.KERNEL32 ref: 00E94422
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$CountTick
                                                                                  • String ID: Executing manually will not work$no data$uPQzHOdQ
                                                                                  • API String ID: 1431039135-1731644993
                                                                                  • Opcode ID: a5216e5a1322d761092eb1a776fb5c0816378cf134aed37dfacbcaa1f068b7f6
                                                                                  • Instruction ID: 49ecb91f74c4716a321d39476d1be21b3ee33601f19298d037e732ae9f8e969e
                                                                                  • Opcode Fuzzy Hash: a5216e5a1322d761092eb1a776fb5c0816378cf134aed37dfacbcaa1f068b7f6
                                                                                  • Instruction Fuzzy Hash: 3C61FB74600604DFCB10EBA5E882E9D73F1EB88300F51A567F915BB7A9DB30AD4A8B51
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,00E914A5,00000001,00000000,00000000,00000000), ref: 00E8D071
                                                                                  • MessageBoxA.USER32(00000000,00E8D18D,00E8D189,00000000), ref: 00E8D08B
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,00E914A5,00000001,00000000), ref: 00E8D093
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000003,00000003,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E8D0B5
                                                                                  • MessageBoxA.USER32(00000000,00E8D191,00E8D189,00000000), ref: 00E8D0CC
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000003,00000003,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E8D176
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Message$CloseCreateHandleReadSize
                                                                                  • String ID:
                                                                                  • API String ID: 2324011479-0
                                                                                  • Opcode ID: 6e89a3003bba3eeb156bc8c0c28fd868161d10e50e388a19bd856a760450b71c
                                                                                  • Instruction ID: cbb86780f583d382a4d2f7137acfc1ae5489acece653c91f3cf022ce62311152
                                                                                  • Opcode Fuzzy Hash: 6e89a3003bba3eeb156bc8c0c28fd868161d10e50e388a19bd856a760450b71c
                                                                                  • Instruction Fuzzy Hash: D831FA74349301AFD254EF29CC85F1AB3E9EF84710F10996DF99CAB392D670E8458B61
                                                                                  APIs
                                                                                  • ___scrt_release_startup_lock.LIBCMT ref: 002F0AA4
                                                                                  • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 002F0AB8
                                                                                  • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 002F0ADD
                                                                                  • ___scrt_get_show_window_mode.LIBCMT ref: 002F0AEF
                                                                                  • ___scrt_uninitialize_crt.LIBCMT ref: 002F0B20
                                                                                  • ___scrt_fastfail.LIBCMT ref: 002F0B6F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ___scrt_is_nonwritable_in_current_image$___scrt_fastfail___scrt_get_show_window_mode___scrt_release_startup_lock___scrt_uninitialize_crt
                                                                                  • String ID:
                                                                                  • API String ID: 4079798206-0
                                                                                  • Opcode ID: b3cd80ccab2d9224b30bcf50082ab235554c2cabb2a264c27e1dcd7163031f51
                                                                                  • Instruction ID: a690eb48e025aff0f1e7ed239e1691a3279dae0bf6241d4dc89f705b37c14912
                                                                                  • Opcode Fuzzy Hash: b3cd80ccab2d9224b30bcf50082ab235554c2cabb2a264c27e1dcd7163031f51
                                                                                  • Instruction Fuzzy Hash: 1A210A2166130EAADA217BB498827BEE3654F427D5F240079F7806B1D3CEA149704E15
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00E90D8C), ref: 00E90D3D
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00E90D8C), ref: 00E90D4C
                                                                                  • ReadFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00E90D8C), ref: 00E90D6B
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00E90D71
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleReadSize
                                                                                  • String ID:
                                                                                  • API String ID: 3919263394-0
                                                                                  • Opcode ID: 8d0dc6ff2cb50f49b356164e3eb62cc30a8b6a4df011f1a0001bd5d9fefde9a4
                                                                                  • Instruction ID: a1fe3d56531f97769cc2d1b3675586da5e320d5ab3040faa12ce893c7344d2e1
                                                                                  • Opcode Fuzzy Hash: 8d0dc6ff2cb50f49b356164e3eb62cc30a8b6a4df011f1a0001bd5d9fefde9a4
                                                                                  • Instruction Fuzzy Hash: FD111E70600604BFE720EFB8CC92F5E76ECDB08710F609575B618F6191E6716E008614
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CALL$|(:
                                                                                  • API String ID: 0-742376880
                                                                                  • Opcode ID: b038019fb491d2ca3515b364e5bd04e8e5352a01245894f1faf3facd81878800
                                                                                  • Instruction ID: fe8c2dea06c26202b7d37e30e37c6b2fece0c899891814d9943356d4f7290f87
                                                                                  • Opcode Fuzzy Hash: b038019fb491d2ca3515b364e5bd04e8e5352a01245894f1faf3facd81878800
                                                                                  • Instruction Fuzzy Hash: 21129B705183419FD725EF14C480B6AB7E1BF89300F15896EE99A8B362C771EDA5CF82
                                                                                  APIs
                                                                                  • __Init_thread_footer.LIBCMT ref: 002D90D4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Init_thread_footer
                                                                                  • String ID: CALL$|(:
                                                                                  • API String ID: 1385522511-742376880
                                                                                  • Opcode ID: ec7c395b51b2df24fc8c3df3ff60636d3a72f41a97b866c4513ce1d2f1de5b91
                                                                                  • Instruction ID: 45cd633e01cf989216f37a0dfe175d845ce19b3409d93ac38ac457ceccc7f731
                                                                                  • Opcode Fuzzy Hash: ec7c395b51b2df24fc8c3df3ff60636d3a72f41a97b866c4513ce1d2f1de5b91
                                                                                  • Instruction Fuzzy Hash: C691A9B0118201DFCB15DF14C880B6ABBE1BF85314F148959F9995B3A2CB71ED65CF92
                                                                                  APIs
                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 003271AE
                                                                                    • Part of subcall function 002D119F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002D1192,?), ref: 002D11BF
                                                                                    • Part of subcall function 002EFDB9: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002EFDD8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Name$Path$FileFullLongOpen
                                                                                  • String ID: (s9$X
                                                                                  • API String ID: 779396738-4059790037
                                                                                  • Opcode ID: dff79ba46af4267c29f0f0e93d544e802d61a599e7916b9743d0efa5baae2e01
                                                                                  • Instruction ID: 7a00359205613893d13eeb7cad2b63345f4ad3536aebe41ca327462f0d0b8d07
                                                                                  • Opcode Fuzzy Hash: dff79ba46af4267c29f0f0e93d544e802d61a599e7916b9743d0efa5baae2e01
                                                                                  • Instruction Fuzzy Hash: 4121D834A24298ABCF02DF95DC457EE7BFDAF49310F00401AE904E7281DBF459998FA1
                                                                                  APIs
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 002F0C74
                                                                                    • Part of subcall function 002F440C: RaiseException.KERNEL32(?,?,?,002F0C96,?,00000001,?,?,?,?,?,?,002F0C96,?,003994C0), ref: 002F446B
                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 002F0C91
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                                  • String ID: Unknown exception
                                                                                  • API String ID: 3476068407-410509341
                                                                                  • Opcode ID: 01fbed31d289a05f4888b85113fe9b187950fc1d70d7d5f1188ddd1957bcfc12
                                                                                  • Instruction ID: c1078136bab9b381ea7753875327a36282fe3a43a2866f9a3a0681a85be19622
                                                                                  • Opcode Fuzzy Hash: 01fbed31d289a05f4888b85113fe9b187950fc1d70d7d5f1188ddd1957bcfc12
                                                                                  • Instruction Fuzzy Hash: 27F0282492020DB78F04FAA9E891EBDF72C4E003C8B908232BB1495493EBB0E535C980
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00358D10
                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 00358D17
                                                                                  • FreeLibrary.KERNEL32(?,?,?,?), ref: 00358EF8
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentFreeLibraryTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 146820519-0
                                                                                  • Opcode ID: ec842c90f331f24928e0c148a82e4ee10a80b7b0d8aa567c6c1738edc009aff3
                                                                                  • Instruction ID: 2af51094255dbd6233fb47b3f19afba07a6025acdc659780e533a1aaf3892a74
                                                                                  • Opcode Fuzzy Hash: ec842c90f331f24928e0c148a82e4ee10a80b7b0d8aa567c6c1738edc009aff3
                                                                                  • Instruction Fuzzy Hash: FE126A71A083419FC715CF28C481B6ABBE5BF88315F05895DE8899B362DB31ED49CF92
                                                                                  APIs
                                                                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,003083FC,?,00399910,0000000C), ref: 00308534
                                                                                  • GetLastError.KERNEL32(?,003083FC,?,00399910,0000000C), ref: 0030853E
                                                                                  • __dosmaperr.LIBCMT ref: 00308569
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                  • String ID:
                                                                                  • API String ID: 2583163307-0
                                                                                  • Opcode ID: 4bf0eef834a8dd812ec54728e059699d0a20d11c1a1945cdbf1b2dbb6d05c1c2
                                                                                  • Instruction ID: f360324bc1ba29862cf67e757e681f7e1ee8a690563ffe7510819ab1e9858188
                                                                                  • Opcode Fuzzy Hash: 4bf0eef834a8dd812ec54728e059699d0a20d11c1a1945cdbf1b2dbb6d05c1c2
                                                                                  • Instruction Fuzzy Hash: 7301DB36A075601AD62B13396C6577F678E4B83734F268219F854DB1D3DE708C818655
                                                                                  APIs
                                                                                  • RegOpenKeyExA.ADVAPI32(?,00000000,00000000,00020119,?), ref: 00E90703
                                                                                  • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,00000100,?,00000000,00000000,00020119,?), ref: 00E9072A
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00020119,?), ref: 00E9074F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3677997916-0
                                                                                  • Opcode ID: 712d3af2663db280e53856c2e5cbdd465a33fd0d0744bc0e4c0c6c4841cc4760
                                                                                  • Instruction ID: d4897849594e60a178ef95272193f56419d18cf259b6a803dd3996fa4897a441
                                                                                  • Opcode Fuzzy Hash: 712d3af2663db280e53856c2e5cbdd465a33fd0d0744bc0e4c0c6c4841cc4760
                                                                                  • Instruction Fuzzy Hash: 01110375A0011CABDB11EA98DC81EDEB7EEAB48314F105566F618F7241EB709E448BA0
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B26
                                                                                  • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B3E
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleWrite
                                                                                  • String ID:
                                                                                  • API String ID: 1065093856-0
                                                                                  • Opcode ID: 71c113f7780988b2d7a5415d46da7f2c93b5f66b914f6b25d07b2f4ddf61b3c9
                                                                                  • Instruction ID: 5ca4dba971181ecd37f32ecbe2a5fdc1095ed35ebbf76699abf8b3940daa5f78
                                                                                  • Opcode Fuzzy Hash: 71c113f7780988b2d7a5415d46da7f2c93b5f66b914f6b25d07b2f4ddf61b3c9
                                                                                  • Instruction Fuzzy Hash: 84018471A00704BEEB21DAA88C83F6EB6ECDB45B24F619175F618F31D0E7B05E009564
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00E78528), ref: 00E781C4
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00E78528), ref: 00E781EB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$AllocFree
                                                                                  • String ID: |
                                                                                  • API String ID: 2087232378-1049989498
                                                                                  • Opcode ID: 9f749ba4c1383ab14612685fd1b565f075e3dc1d3cbb632ba9a4cd408b8ed186
                                                                                  • Instruction ID: 5450c0ff5e0ad0bb078092243147ec5da237583b9d6084b350a036b0e3a699d1
                                                                                  • Opcode Fuzzy Hash: 9f749ba4c1383ab14612685fd1b565f075e3dc1d3cbb632ba9a4cd408b8ed186
                                                                                  • Instruction Fuzzy Hash: C5F027B2B4262017EB60DA6C4D89F525AD49F95790F159070F94CFF3C8CBA18C0282A1
                                                                                  APIs
                                                                                  • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00E92B9A), ref: 00E92B0F
                                                                                  • RegCreateKeyExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00E92B9A), ref: 00E92B43
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateOpen
                                                                                  • String ID:
                                                                                  • API String ID: 436179556-0
                                                                                  • Opcode ID: beecb88b0930666e5c422543f84d4ce7f25825666046fbbb371b3bd4a6610b2d
                                                                                  • Instruction ID: dc06c08ecad02509d0ed353ad43c62fd8a7f0c46f75a248ccbf1b6339bf250ab
                                                                                  • Opcode Fuzzy Hash: beecb88b0930666e5c422543f84d4ce7f25825666046fbbb371b3bd4a6610b2d
                                                                                  • Instruction Fuzzy Hash: 29315E31E00208BFDF21DAA4C881BDEB7F9EB44300F5494A9FA14F3281E7759A458710
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 00E783D2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: |
                                                                                  • API String ID: 4275171209-1049989498
                                                                                  • Opcode ID: b7817dfab5660ec01ec729f1aca57a123e7a728b1ab4a2f358a02efdde6af2cf
                                                                                  • Instruction ID: 077b7b383f9aefdb9b3b2698cc37c736ed5d3f0cf4ac0cffcff3519efce1bb62
                                                                                  • Opcode Fuzzy Hash: b7817dfab5660ec01ec729f1aca57a123e7a728b1ab4a2f358a02efdde6af2cf
                                                                                  • Instruction Fuzzy Hash: C821FFB0244242EFCB50CF2CD984A9ABBE0FFA8714F108969F999DB350D730E904CB52
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E782EA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID: |
                                                                                  • API String ID: 1263568516-1049989498
                                                                                  • Opcode ID: 2468c036a3621ec6d25cafcea5af33c1d1d5fb6dd3a820f707e6af8cdeae6aff
                                                                                  • Instruction ID: 0d7a153194c416cb486af45b44897d937caa95744c29c0649a78e5e0f8bed696
                                                                                  • Opcode Fuzzy Hash: 2468c036a3621ec6d25cafcea5af33c1d1d5fb6dd3a820f707e6af8cdeae6aff
                                                                                  • Instruction Fuzzy Hash: 5C21B074644302AFC350DF1DD988A0ABBE1EB98720F24C92EE4D897361D731E944CB56
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,?,00004000), ref: 00E78489
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID: |
                                                                                  • API String ID: 1263568516-1049989498
                                                                                  • Opcode ID: 65b3f73c90bb03f5439f803a8117ae39b8ed3412679b7f2e468377686ead5149
                                                                                  • Instruction ID: d0ebe1e53b7b3f034987109476aaf68a53001a56312f47593c13557ef955ba5f
                                                                                  • Opcode Fuzzy Hash: 65b3f73c90bb03f5439f803a8117ae39b8ed3412679b7f2e468377686ead5149
                                                                                  • Instruction Fuzzy Hash: 1421E3B5244302DFC760CF28D984A5AB7E0FF99310B108959E5A8EB314E770E908CF52
                                                                                  APIs
                                                                                  • ReadFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00E90D8C), ref: 00E90D6B
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00E90D71
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFileHandleRead
                                                                                  • String ID:
                                                                                  • API String ID: 2331702139-0
                                                                                  • Opcode ID: 83636c7858381a764d5607983684025f987ed1fa5f4fb355f7c446a5ca1f9f46
                                                                                  • Instruction ID: 91566c1548491d3e995266e648f008104f63a08ecea60e34e5487d275acb4738
                                                                                  • Opcode Fuzzy Hash: 83636c7858381a764d5607983684025f987ed1fa5f4fb355f7c446a5ca1f9f46
                                                                                  • Instruction Fuzzy Hash: 5BE0BFB5504204AFEB14EFA4D892EADB7ECEF44300FA0A475B558E6145DA74AA009B20
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,?,?,00E92E5D,00000000,00E92FC4,?,?,00000000,00000000), ref: 00E90695
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,?,?,00E92E5D,00000000,00E92FC4,?,?,00000000,00000000), ref: 00E906B2
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: 2322c5053fb42436831286030d8023206803bd5b9f693278f3b2b0df1fe8d399
                                                                                  • Instruction ID: 5a7ae945018487d19801662f27a787c7ff4ffccc5136969f94b60752dec86378
                                                                                  • Opcode Fuzzy Hash: 2322c5053fb42436831286030d8023206803bd5b9f693278f3b2b0df1fe8d399
                                                                                  • Instruction Fuzzy Hash: E0D0C781F117205ACD2131BC1CC6F5B01CD8B59774B646611F538F3583E7568DD10190
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00E94055,00000000,00E94070,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E93CF7
                                                                                  • TerminateProcess.KERNEL32(00000000,00000000,00E94055,00000000,00E94070,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E93CFD
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 2429186680-0
                                                                                  • Opcode ID: b11399cddf9350ece28e91c1209740a3cf97649afd2b7b8c8d81269606c38880
                                                                                  • Instruction ID: 82dbb97f5c03b5643b0f5ea8d6b2b83e3197c0b874f150a6751d85c45b38201b
                                                                                  • Opcode Fuzzy Hash: b11399cddf9350ece28e91c1209740a3cf97649afd2b7b8c8d81269606c38880
                                                                                  • Instruction Fuzzy Hash: C99002855D560014D86032B00C57F19448C5B40716FE0B458F20CB5186489840000121
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0af7cd571246b23d8ee472ca723441a24673c7737eab510d91e5e5f5640baa5f
                                                                                  • Instruction ID: 3fcd3073114fa58fcf2b0299ceb9731202f599847adf6f374e0b4dca1100dc20
                                                                                  • Opcode Fuzzy Hash: 0af7cd571246b23d8ee472ca723441a24673c7737eab510d91e5e5f5640baa5f
                                                                                  • Instruction Fuzzy Hash: 4B51FB31A1010DAFDF12DF18C840B79BBB9EF853A4F1A8164E9189B3A1C771DD52CB90
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(?,?), ref: 0034016F
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharLower
                                                                                  • String ID:
                                                                                  • API String ID: 2358735015-0
                                                                                  • Opcode ID: fd0dfad59dac8a42cdf832fa6d4ed2f1ae55509e60e186d212caf325328bf1b3
                                                                                  • Instruction ID: b4bcade7ab05d926b2a292d7cd5bbabbb686814b15995b010e5d215cf188c96a
                                                                                  • Opcode Fuzzy Hash: fd0dfad59dac8a42cdf832fa6d4ed2f1ae55509e60e186d212caf325328bf1b3
                                                                                  • Instruction Fuzzy Hash: 9F418676600209AFDB16DFA4C8819AEB7F9FF44310B11892EE6569B291DB70EE448F50
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumWindows
                                                                                  • String ID:
                                                                                  • API String ID: 1129996299-0
                                                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction ID: 8e482854e71b5e0b7c357d99ad602f785c8b83f8ec3194d36771b65941574620
                                                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction Fuzzy Hash: D631E370A1010ADBC718CF58C4D497DF7A6FB49380B2486E5E909CB256D731EDE1CB90
                                                                                  APIs
                                                                                    • Part of subcall function 002E290F: LoadLibraryA.KERNEL32(kernel32.dll,?,?,002E27DC,?,?,002E058E,?,00000001), ref: 002E291B
                                                                                    • Part of subcall function 002E290F: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 002E292D
                                                                                    • Part of subcall function 002E290F: FreeLibrary.KERNEL32(00000000,?,?,002E27DC,?,?,002E058E,?,00000001), ref: 002E293F
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,002E058E,?,00000001), ref: 002E27FC
                                                                                    • Part of subcall function 002E28D8: LoadLibraryA.KERNEL32(kernel32.dll,?,?,003277B4,?,?,002E058E,?,00000001), ref: 002E28E1
                                                                                    • Part of subcall function 002E28D8: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 002E28F3
                                                                                    • Part of subcall function 002E28D8: FreeLibrary.KERNEL32(00000000,?,?,003277B4,?,?,002E058E,?,00000001), ref: 002E2906
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Load$AddressFreeProc
                                                                                  • String ID:
                                                                                  • API String ID: 2632591731-0
                                                                                  • Opcode ID: 288b8ca54475e810daadd3bb7b4c0d7a0b013fddf4b496583ae6b20c7639b501
                                                                                  • Instruction ID: a3d41dc9785cedbb1eacab4d430900646470525f8c7a81a7830519619269ab7e
                                                                                  • Opcode Fuzzy Hash: 288b8ca54475e810daadd3bb7b4c0d7a0b013fddf4b496583ae6b20c7639b501
                                                                                  • Instruction Fuzzy Hash: 8C1108316A0249EACF15FF25C902BAD77A8DF40710F90842DF443961C1DE715A299B60
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountTick
                                                                                  • String ID:
                                                                                  • API String ID: 536389180-0
                                                                                  • Opcode ID: e05db01a2dd0211474c15012bf597f0e361d39c9b5493031b1065bcab0a3f0b5
                                                                                  • Instruction ID: f0140ec92360b594aea51663f8563f89fcc92a1e7432605b046f2157b48f1589
                                                                                  • Opcode Fuzzy Hash: e05db01a2dd0211474c15012bf597f0e361d39c9b5493031b1065bcab0a3f0b5
                                                                                  • Instruction Fuzzy Hash: 0D11F1B4E04309AFCF04DF99C8818AEB7F9FB48710B509465F818A7341D730AE108F91
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wsopen_s
                                                                                  • String ID:
                                                                                  • API String ID: 3347428461-0
                                                                                  • Opcode ID: 64ba64d267795046e2162a5fac2bfd2130c38f5813e9b3dd51b512ad5de587b5
                                                                                  • Instruction ID: a21e32c36ed3b434c3fa0d31e2ee7fb325d7e892242248dfb279a538cde31a20
                                                                                  • Opcode Fuzzy Hash: 64ba64d267795046e2162a5fac2bfd2130c38f5813e9b3dd51b512ad5de587b5
                                                                                  • Instruction Fuzzy Hash: AF112A7590510AAFCF06DF58E94199E7BF8EF48310F114459FC09AB351D631EA21CBA5
                                                                                  APIs
                                                                                    • Part of subcall function 0030287C: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00302D00,00000001,00000364,?,?,?,003026D1,0030281A,?,?,002DFC79,?), ref: 003028BD
                                                                                  • _free.LIBCMT ref: 00304E98
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap_free
                                                                                  • String ID:
                                                                                  • API String ID: 614378929-0
                                                                                  • Opcode ID: c57330368dedb74c64afd24965cb97a48ffaf81de64891be2ccdd6010017c593
                                                                                  • Instruction ID: f8495f1d53a04cc6e0e6640bc02a113c3ac71176bb5ce83ad94263300d93e973
                                                                                  • Opcode Fuzzy Hash: c57330368dedb74c64afd24965cb97a48ffaf81de64891be2ccdd6010017c593
                                                                                  • Instruction Fuzzy Hash: FB01D6B2201305ABE3228F69D895A5AFBDDFB85370F25051DE694872C0EA30A905C764
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b2009a02d5f339f5257c59c963c83ace43b5680a0de814ef047c30addbb01e52
                                                                                  • Instruction ID: 159880099b7e65983f70fb6b7e34816c7b706e99a6fc979eff52f3d015ce856b
                                                                                  • Opcode Fuzzy Hash: b2009a02d5f339f5257c59c963c83ace43b5680a0de814ef047c30addbb01e52
                                                                                  • Instruction Fuzzy Hash: 44F07D3252261D5ADA333E29CC19B7BB3488F413B4F110B25F7659B0E2DF70D81187A1
                                                                                  APIs
                                                                                  • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00E92C16
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID:
                                                                                  • API String ID: 3702945584-0
                                                                                  • Opcode ID: f3c9aa981de00efd08ed2294cf79377c231f131312860de0faba8aa352c284c4
                                                                                  • Instruction ID: 65eab2cc4db227be7996b0cb7c9cd562bda06d0ff5edac8f72297470d44b7ba6
                                                                                  • Opcode Fuzzy Hash: f3c9aa981de00efd08ed2294cf79377c231f131312860de0faba8aa352c284c4
                                                                                  • Instruction Fuzzy Hash: EFF04471A04108BFDB14EA9DDC81FAFBBED9B49310F149166FA1CE7351D6719D0087A1
                                                                                  APIs
                                                                                  • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00E92C16
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID:
                                                                                  • API String ID: 3702945584-0
                                                                                  • Opcode ID: c1d0b103646b8e9feab77da548537067d4a3a05487d38df65781f15ee58d9a99
                                                                                  • Instruction ID: 13404b6060cfd1a47e12efa5cc9ec14056506086d8ed75141e1e06df5ac86522
                                                                                  • Opcode Fuzzy Hash: c1d0b103646b8e9feab77da548537067d4a3a05487d38df65781f15ee58d9a99
                                                                                  • Instruction Fuzzy Hash: D3F04471A04108BBCB14EA9DDC81F9FBBED9B49310F149166FA1CE7351D6719D0087A1
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00302D00,00000001,00000364,?,?,?,003026D1,0030281A,?,?,002DFC79,?), ref: 003028BD
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 1d26467b65dc3888d2cd75b3f29f2010e3a7957095bc679a9187252820c6a330
                                                                                  • Instruction ID: 7b475b38fc0dfca13408f313ccee12ee73a2d60eff6dc49e45b33f64be69d954
                                                                                  • Opcode Fuzzy Hash: 1d26467b65dc3888d2cd75b3f29f2010e3a7957095bc679a9187252820c6a330
                                                                                  • Instruction Fuzzy Hash: 23F0B43960222966EB232B269C2DB6B779CBF417A0B26C161F815AA1D4DB70D80087F0
                                                                                  APIs
                                                                                  • LoadStringA.USER32(00000000,00010000,?,00001000), ref: 00E7C9AB
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString
                                                                                  • String ID:
                                                                                  • API String ID: 2948472770-0
                                                                                  • Opcode ID: 98cb9e290b6fcda0473899373f779afeb580b28c0de553bc535e0dfee71ead7e
                                                                                  • Instruction ID: 4ef9e1e06d622049684edb1c8c6f40fc91679e83efa838ee35e3be2c1829bde2
                                                                                  • Opcode Fuzzy Hash: 98cb9e290b6fcda0473899373f779afeb580b28c0de553bc535e0dfee71ead7e
                                                                                  • Instruction Fuzzy Hash: 3EF030727005109FCB51EA6CC8C1F9A72DC9B88355B14D065B74CEB359DB60DC4587A2
                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000000,?,00000001,?,002F0445,?,?,002DFA72,00000000,?,?,?,002D1188,?), ref: 00302860
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 049663c6b66066903bde5365311fdffbd3c0df0df951e387ae784616753fa8f0
                                                                                  • Instruction ID: c4fe11acbc81a2a19376948fc7940e3e9997668ebaf75d0897c188adc0e929b2
                                                                                  • Opcode Fuzzy Hash: 049663c6b66066903bde5365311fdffbd3c0df0df951e387ae784616753fa8f0
                                                                                  • Instruction Fuzzy Hash: 81E0E5391022295AD62336665C1C76B7A4CAF023A0F16C121FD45965D1CA90CC0087A0
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 195d9f40450377a24953f430e1837228e240c7004da54213acd65805d4fed96c
                                                                                  • Instruction ID: 43dbc146078e19ebb84b25b086f8a2c0a2fa7fa21e9ce41c9f3baafabff5c730
                                                                                  • Opcode Fuzzy Hash: 195d9f40450377a24953f430e1837228e240c7004da54213acd65805d4fed96c
                                                                                  • Instruction Fuzzy Hash: C1F0A970555312CFCB358F25E880826BBE9BF003293208A7EE2D782620C372A854CF60
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00304BC8
                                                                                    • Part of subcall function 003027F4: RtlFreeHeap.NTDLL(00000000,00000000,?,002DFC79,?,?,002D111E), ref: 0030280A
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap_free
                                                                                  • String ID:
                                                                                  • API String ID: 3249267023-0
                                                                                  • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                                                  • Instruction ID: 4af56eaceee8dc701ef33b100c0cf280382d20bad37a16862381636650444c59
                                                                                  • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                                                  • Instruction Fuzzy Hash: 63E0927A1053059FC725DF6DE410B82B7E4EF843603218529E99DD7250D731F812CB80
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock
                                                                                  • String ID:
                                                                                  • API String ID: 2638373210-0
                                                                                  • Opcode ID: 5aa6600b3c90dabe8e751dc9537f39b12223877b02cec01d2e468d945b000684
                                                                                  • Instruction ID: 4d498275ff7ab9c4e172dbffec7711a9133733ec618512748ffc3a65409b600f
                                                                                  • Opcode Fuzzy Hash: 5aa6600b3c90dabe8e751dc9537f39b12223877b02cec01d2e468d945b000684
                                                                                  • Instruction Fuzzy Hash: 4FF0587240020DFFDF05CF80C941EAABB79FF04314F208189F9148A212D332EA21EBA1
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(002D0000,?,00000105), ref: 00E7BE37
                                                                                    • Part of subcall function 00E7C0AD: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00E7C0C8
                                                                                    • Part of subcall function 00E7C0AD: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00E7C0E6
                                                                                    • Part of subcall function 00E7C0AD: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00E7C104
                                                                                    • Part of subcall function 00E7C0AD: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00E7C122
                                                                                    • Part of subcall function 00E7C0AD: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,00E7C1B1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00E7C16B
                                                                                    • Part of subcall function 00E7C0AD: RegQueryValueExA.ADVAPI32(?,00E7C32D,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,00E7C1B1,?,80000001), ref: 00E7C189
                                                                                    • Part of subcall function 00E7C0AD: RegCloseKey.ADVAPI32(?,00E7C1B8,00000000,00000000,00000005,00000000,00E7C1B1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00E7C1AB
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open$FileModuleNameQueryValue$Close
                                                                                  • String ID:
                                                                                  • API String ID: 2796650324-0
                                                                                  • Opcode ID: 4f6f7f1076de1bd117e32dae873e78de734a710e1bc72a608b831ebaeac8ce49
                                                                                  • Instruction ID: 7d20dc38a3d390e47a680d4a9b343fec5a321926169aae66401b268200d97c61
                                                                                  • Opcode Fuzzy Hash: 4f6f7f1076de1bd117e32dae873e78de734a710e1bc72a608b831ebaeac8ce49
                                                                                  • Instruction Fuzzy Hash: 91E06D71A003148BCB10DE5888C1A8733E8AF08758F009995AD68DF34AD371DD2487D1
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,?,00E9021F,00000000,00E9262F,00E927D5,?,c:\,00E927D5,?,c:\), ref: 00E7E628
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: d9ea6dab54ef532fb87bc64f2264bfe69af9be573fabfd3a2d7305f2dc2b692b
                                                                                  • Instruction ID: b0fe6fc083be7f635d753bec2a4fd7649f8bfb4cbcb5da7f2df1ebba498b5a91
                                                                                  • Opcode Fuzzy Hash: d9ea6dab54ef532fb87bc64f2264bfe69af9be573fabfd3a2d7305f2dc2b692b
                                                                                  • Instruction Fuzzy Hash: 1EC08CA06112000A5E30A2FC1CC110A02C95A2C23C320BAA5F03CF22C2E312C8522010
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,00000000,?,0031062E,?,?,00000000,?,0031062E,00000000,0000000C), ref: 003102E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2963731403.00000000002D1000.00000020.00000001.01000000.0000000B.sdmp, Offset: 002D0000, based on PE: true
                                                                                  • Associated: 0000002D.00000002.2963708420.00000000002D0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.000000000036D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963913988.0000000000391000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963972003.000000000039D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                  • Associated: 0000002D.00000002.2963994434.00000000003A5000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_2d0000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 61244a992cd8f05ddfe00d28425a3c2cf44ad9cac7f11039a207780a5c0fec78
                                                                                  • Instruction ID: 752b8f3b30ed61f06531acb909488c8d639cc24e52bb52b5793b6f8f2ff422b1
                                                                                  • Opcode Fuzzy Hash: 61244a992cd8f05ddfe00d28425a3c2cf44ad9cac7f11039a207780a5c0fec78
                                                                                  • Instruction Fuzzy Hash: 43D06C3210010DBBDF028F84DD06EDA3BAAFB4C714F018000FE1856020C772E821AB90
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00E9022A,00000000,00E9262F,00E927D5,?,c:\,00E927D5,?,c:\), ref: 00E7E942
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory
                                                                                  • String ID:
                                                                                  • API String ID: 4241100979-0
                                                                                  • Opcode ID: 2afb928ea0769a03e65cdb2334b4541331df32d5787a6e4dcd60dacd8e68de1d
                                                                                  • Instruction ID: f3706b27ca1747f93cc4cd9e7ed895c6d81b0dd54962bce05e3f63b83bf3e94e
                                                                                  • Opcode Fuzzy Hash: 2afb928ea0769a03e65cdb2334b4541331df32d5787a6e4dcd60dacd8e68de1d
                                                                                  • Instruction Fuzzy Hash: A4B012D2B713405BEE2035F81CE2F2F00CDDB04A06F206C35F259E6143E577C8450410
                                                                                  APIs
                                                                                    • Part of subcall function 00E90AE1: CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B26
                                                                                    • Part of subcall function 00E90AE1: WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B3E
                                                                                    • Part of subcall function 00E90AE1: CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B4A
                                                                                  • Sleep.KERNEL32(00000002,00000000,00E90BE6), ref: 00E90BC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleSleepWrite
                                                                                  • String ID:
                                                                                  • API String ID: 1443029356-0
                                                                                  • Opcode ID: 21ae6d8886bc8d5191860912279505c19bb37bffdb4b2f6364f60fff6bfbd6e0
                                                                                  • Instruction ID: 57b25b4db9b635ffef950c9c36099acfad2d3d4232a353018b7f23f407d2127b
                                                                                  • Opcode Fuzzy Hash: 21ae6d8886bc8d5191860912279505c19bb37bffdb4b2f6364f60fff6bfbd6e0
                                                                                  • Instruction Fuzzy Hash: 35F06870A04608EFDB15EBA8C852A9EB7F8EB48710F9090B5F508F7691EB709E40D651
                                                                                  APIs
                                                                                    • Part of subcall function 00E90AE1: CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B26
                                                                                    • Part of subcall function 00E90AE1: WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B3E
                                                                                    • Part of subcall function 00E90AE1: CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,00000000,00E90B65), ref: 00E90B4A
                                                                                  • Sleep.KERNEL32(00000002,00000000,00E90BE6), ref: 00E90BC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000002D.00000002.2965202815.0000000000E75000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E75000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_45_2_e75000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleSleepWrite
                                                                                  • String ID:
                                                                                  • API String ID: 1443029356-0
                                                                                  • Opcode ID: 29e9c8c051b88c965c0052c8ac0b415f771b4b4b6509a6246b541ef195558393
                                                                                  • Instruction ID: 2892ab4d207fd937a7a2466fc5d6a87a5aff0b26cdc6c7dddc5756f17c49cf5f
                                                                                  • Opcode Fuzzy Hash: 29e9c8c051b88c965c0052c8ac0b415f771b4b4b6509a6246b541ef195558393
                                                                                  • Instruction Fuzzy Hash: C5F06870A04604EFDF15EBA8C852AAEB7F9EB88304F9094B5F40CF7551E7715E41D610