Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Po-AD841.exe

Overview

General Information

Sample name:Po-AD841.exe
Analysis ID:1567058
MD5:3a527332eb27810c3e18462d2d8cc232
SHA1:8d1e0ff62107ad61e330224e9f61d5a134b5282c
SHA256:e18fae2e11693afffb6335ebc29bc17bb298c5644c2790c45b88dd9860bf9e3f
Tags:AgentTeslaexeuser-mamrmu
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Po-AD841.exe (PID: 6568 cmdline: "C:\Users\user\Desktop\Po-AD841.exe" MD5: 3A527332EB27810C3E18462D2D8CC232)
    • Po-AD841.exe (PID: 2044 cmdline: "C:\Users\user\Desktop\Po-AD841.exe" MD5: 3A527332EB27810C3E18462D2D8CC232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.wapination.net", "Username": "wk@wapination.net", "Password": "Leavemealone@26"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            1.2.Po-AD841.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.Po-AD841.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                1.2.Po-AD841.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33801:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33873:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x338fd:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3398f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x339f9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x33a6b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x33b01:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33b91:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.Po-AD841.exe.390ec80.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.Po-AD841.exe.390ec80.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 108.179.234.136, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Po-AD841.exe, Initiated: true, ProcessId: 2044, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49734
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Po-AD841.exeAvira: detected
                    Source: 1.2.Po-AD841.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.wapination.net", "Username": "wk@wapination.net", "Password": "Leavemealone@26"}
                    Source: Po-AD841.exeReversingLabs: Detection: 52%
                    Source: Po-AD841.exeVirustotal: Detection: 40%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Po-AD841.exeJoe Sandbox ML: detected
                    Source: Po-AD841.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Po-AD841.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: global trafficTCP traffic: 192.168.2.4:49734 -> 108.179.234.136:587
                    Source: Joe Sandbox ViewIP Address: 108.179.234.136 108.179.234.136
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: global trafficTCP traffic: 192.168.2.4:49734 -> 108.179.234.136:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: mail.wapination.net
                    Source: Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.wapination.net
                    Source: Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114332988.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002D73000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120926139.0000000006715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                    Source: Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114332988.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002D73000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120926139.0000000006715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                    Source: Po-AD841.exe, 00000000.00000002.1652126638.0000000000E77000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000000.00000002.1653939202.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Po-AD841.exe, 00000000.00000002.1653724822.000000000591B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comic
                    Source: Po-AD841.exe, 00000000.00000002.1652126638.0000000000E77000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000000.00000002.1653939202.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000000.00000002.1653724822.000000000591B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120666762.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120978659.0000000006725000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4119640029.00000000056A5000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120720580.00000000066CA000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114685725.000000000113F000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120666762.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120978659.0000000006725000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4119640029.00000000056A5000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120720580.00000000066CA000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114685725.000000000113F000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: Po-AD841.exe, 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Po-AD841.exeString found in binary or memory: https://aka.ms/binaryformatter
                    Source: Po-AD841.exeString found in binary or memory: https://aka.ms/dotnet-warnings/
                    Source: Po-AD841.exeString found in binary or memory: https://aka.ms/serializationformat-binary-obsolete

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Po-AD841.exe.390ec80.1.raw.unpack, 5FiJFFLmv5.cs.Net Code: _3extOpBhn
                    Source: C:\Users\user\Desktop\Po-AD841.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Po-AD841.exeJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 1.2.Po-AD841.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Po-AD841.exe.390ec80.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Po-AD841.exe.390ec80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 0_2_00DCDF0C0_2_00DCDF0C
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_014942301_2_01494230
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_01494B001_2_01494B00
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_01493EE81_2_01493EE8
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_0149BE101_2_0149BE10
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_0149BE201_2_0149BE20
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_0638A6701_2_0638A670
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063804981_2_06380498
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063892281_2_06389228
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_0638F2A81_2_0638F2A8
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063860201_2_06386020
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_0638BE001_2_0638BE00
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_06383A081_2_06383A08
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_0638B7201_2_0638B720
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063899701_2_06389970
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063C46E91_2_063C46E9
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063C74DC1_2_063C74DC
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063C04D01_2_063C04D0
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063C26E81_2_063C26E8
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063C80711_2_063C8071
                    Source: Po-AD841.exe, 00000000.00000002.1652736475.0000000002791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef4ce6eba-27b2-4f42-807a-59a27e751d9c.exe4 vs Po-AD841.exe
                    Source: Po-AD841.exe, 00000000.00000002.1650376775.000000000091E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Po-AD841.exe
                    Source: Po-AD841.exe, 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSoftwareGame.dll: vs Po-AD841.exe
                    Source: Po-AD841.exe, 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef4ce6eba-27b2-4f42-807a-59a27e751d9c.exe4 vs Po-AD841.exe
                    Source: Po-AD841.exe, 00000000.00000000.1643475825.0000000000362000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameShouldIsee.exe6 vs Po-AD841.exe
                    Source: Po-AD841.exe, 00000001.00000002.4113973524.000000000043E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef4ce6eba-27b2-4f42-807a-59a27e751d9c.exe4 vs Po-AD841.exe
                    Source: Po-AD841.exe, 00000001.00000002.4114133423.0000000000D68000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Po-AD841.exe
                    Source: Po-AD841.exeBinary or memory string: OriginalFilenameShouldIsee.exe6 vs Po-AD841.exe
                    Source: Po-AD841.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 1.2.Po-AD841.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Po-AD841.exe.390ec80.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Po-AD841.exe.390ec80.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: Po-AD841.exe, PasswordBasedEncryption.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                    Source: Po-AD841.exe, PasswordBasedEncryption.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock', 'TransformBlock'
                    Source: Po-AD841.exe, PkcsHelpers.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Po-AD841.exe.5060000.3.raw.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Po-AD841.exe.5060000.3.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@1/1
                    Source: C:\Users\user\Desktop\Po-AD841.exeMutant created: NULL
                    Source: Po-AD841.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Po-AD841.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Po-AD841.exeReversingLabs: Detection: 52%
                    Source: Po-AD841.exeVirustotal: Detection: 40%
                    Source: unknownProcess created: C:\Users\user\Desktop\Po-AD841.exe "C:\Users\user\Desktop\Po-AD841.exe"
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess created: C:\Users\user\Desktop\Po-AD841.exe "C:\Users\user\Desktop\Po-AD841.exe"
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess created: C:\Users\user\Desktop\Po-AD841.exe "C:\Users\user\Desktop\Po-AD841.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Po-AD841.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Po-AD841.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: Po-AD841.exe, XPE.cs.Net Code: Polan System.AppDomain.Load(byte[])
                    Source: Po-AD841.exeStatic PE information: 0x91C2FBA4 [Sun Jun 30 02:32:04 2047 UTC]
                    Source: C:\Users\user\Desktop\Po-AD841.exeCode function: 1_2_063C8BD0 push es; ret 1_2_063C8BE0
                    Source: Po-AD841.exeStatic PE information: section name: .text entropy: 7.270205838602211
                    Source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                    Source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'
                    Source: 0.2.Po-AD841.exe.5060000.3.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                    Source: 0.2.Po-AD841.exe.5060000.3.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'
                    Source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, Form1.csHigh entropy of concatenated method names: 'oxycobaltammine', 'fringier', 'unchorded', 'wAhRr7CKv', 'Dispose', 'lVOGV1721', 'ULHqFVpPeqZbNsBNpV', 'TchE2TMnA4CKf52ZUf', 'f0mq9hQrUpsqOwSyGd', 'nTd0Zl0tx6BYOWEqZW'
                    Source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, QJDLGErGwGLnDsDTGnUfx.csHigh entropy of concatenated method names: 'pwiMsJJwOLAUrsrsiLrJk', 'vkJkyBAyMrJJZpZnJUUsB', 'pBDTEixOwwhDhOiywipLh', 'wZnEyxixGJZZTGvwQsrMDAvGiTwBJLT', 'erhT', 'aerhTteS46w', 'LvfQyBLvviAnvZJBUkfipTGCDTvQDxU', 'F6WFViyxW', 'TE3wDwuNS', 'MyGetProcAddressWrapper'
                    Source: C:\Users\user\Desktop\Po-AD841.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Po-AD841.exeMemory allocated: C50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeMemory allocated: 2790000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeMemory allocated: 4790000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeMemory allocated: 1490000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeMemory allocated: 2CC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeMemory allocated: 4CC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeWindow / User API: threadDelayed 2455Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeWindow / User API: threadDelayed 7401Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -99016s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98233s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -98015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -97856s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -97719s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -97449s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -97343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -97231s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -97125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -97015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -96031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95266s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -95047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -94937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -94827s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -94719s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -94609s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -94500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exe TID: 2004Thread sleep time: -94390s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99671Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99344Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99234Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99125Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 99016Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98906Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98797Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98687Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98578Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98469Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98344Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98233Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98125Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 98015Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 97856Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 97719Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 97449Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 97343Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 97231Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 97125Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 97015Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96906Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96797Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96687Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96469Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96359Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96250Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96140Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 96031Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95922Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95812Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95703Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95594Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95484Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95375Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95266Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95156Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 95047Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 94937Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 94827Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 94719Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 94609Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 94500Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeThread delayed: delay time: 94390Jump to behavior
                    Source: Po-AD841.exe, 00000001.00000002.4114685725.000000000113F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeProcess created: C:\Users\user\Desktop\Po-AD841.exe "C:\Users\user\Desktop\Po-AD841.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Users\user\Desktop\Po-AD841.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Users\user\Desktop\Po-AD841.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.Po-AD841.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.390ec80.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.390ec80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Po-AD841.exe PID: 6568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Po-AD841.exe PID: 2044, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Po-AD841.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Po-AD841.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 1.2.Po-AD841.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.390ec80.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.390ec80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Po-AD841.exe PID: 6568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Po-AD841.exe PID: 2044, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.2.Po-AD841.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.390ec80.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.390ec80.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.381c5b0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Po-AD841.exe.37dad80.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Po-AD841.exe PID: 6568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Po-AD841.exe PID: 2044, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Software Packing
                    NTDS111
                    Security Software Discovery
                    Distributed Component Object Model21
                    Input Capture
                    11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets1
                    Process Discovery
                    SSH1
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Po-AD841.exe53%ReversingLabsWin32.Spyware.Negasteal
                    Po-AD841.exe40%VirustotalBrowse
                    Po-AD841.exe100%AviraHEUR/AGEN.1307361
                    Po-AD841.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    mail.wapination.net0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.fonts.comic0%Avira URL Cloudsafe
                    http://mail.wapination.net0%Avira URL Cloudsafe
                    http://mail.wapination.net0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.wapination.net
                    108.179.234.136
                    truetrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://aka.ms/binaryformatterPo-AD841.exefalse
                      high
                      http://r10.o.lencr.org0#Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114332988.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002D73000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120926139.0000000006715000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comPo-AD841.exe, 00000000.00000002.1652126638.0000000000E77000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000000.00000002.1653939202.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fonts.comicPo-AD841.exe, 00000000.00000002.1653724822.000000000591B000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://account.dyn.com/Po-AD841.exe, 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://aka.ms/dotnet-warnings/Po-AD841.exefalse
                              high
                              http://mail.wapination.netPo-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002DB6000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://x1.c.lencr.org/0Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120666762.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120978659.0000000006725000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4119640029.00000000056A5000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120720580.00000000066CA000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114685725.000000000113F000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://x1.i.lencr.org/0Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120666762.00000000066B2000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120978659.0000000006725000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4119640029.00000000056A5000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120720580.00000000066CA000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114685725.000000000113F000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://r10.i.lencr.org/0Po-AD841.exe, 00000001.00000002.4115540840.0000000002FBD000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120855460.00000000066F9000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4114332988.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.000000000305A000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120772455.00000000066D6000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002D73000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000031A0000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.0000000002F21000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4115540840.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120877769.0000000006701000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000001.00000002.4120926139.0000000006715000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://aka.ms/serializationformat-binary-obsoletePo-AD841.exefalse
                                      high
                                      http://www.sajatypeworks.comPo-AD841.exe, 00000000.00000002.1652126638.0000000000E77000.00000004.00000020.00020000.00000000.sdmp, Po-AD841.exe, 00000000.00000002.1653939202.0000000006AF2000.00000004.00000800.00020000.00000000.sdmp, Po-AD841.exe, 00000000.00000002.1653724822.000000000591B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        108.179.234.136
                                        mail.wapination.netUnited States
                                        46606UNIFIEDLAYER-AS-1UStrue
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1567058
                                        Start date and time:2024-12-03 01:23:09 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 6m 55s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:7
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:Po-AD841.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@3/0@1/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 90
                                        • Number of non-executed functions: 7
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        TimeTypeDescription
                                        19:24:03API Interceptor10493990x Sleep call for process: Po-AD841.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        108.179.234.136DHL Shipping Documents 0016229753_PDF.exeGet hashmaliciousAgentTeslaBrowse
                                          95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            Shipping Documents_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              SecuriteInfo.com.Win32.PWSX-gen.20769.7015.exeGet hashmaliciousAgentTeslaBrowse
                                                SecuriteInfo.com.Win32.PWSX-gen.12152.17697.exeGet hashmaliciousAgentTeslaBrowse
                                                  Shipping Documents_pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                    Quotation_#432768#_pdf.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      Payment Advice Copy-EUR 5500,00 20240419165413-docx.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        Payment_Advice-pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          UNIFIEDLAYER-AS-1USV-Mail.msgGet hashmaliciousUnknownBrowse
                                                          • 69.49.245.172
                                                          https://protect.checkpoint.com/v2/r01/___https:/vlp6cm34.r.us-east-1.awstrack.me/Q5dmyyux:e7Ke7Kjrfnq.ynintwjuqD.htr*7Kh*7KjOBJBJLTmXFRFSIYBSOlvWZ1QLgoUfHylhY/JnF_riAUpCWczNA0yO_jaB*~*oG6AYM23pBoyDNMJ-PJR-NmPFsN*~*VgZA/PF0HUyICotYzOGFnKvZNBMhC*~*KfYclayEc_La*~*ccZq7wY-S_IKBLwx/KWAAv8MVfzRwNM6LCN8Jigf*~*80C6gkuabRjmLM--7qPAcOAlUFFI__5pCS9Bd6d565556c8b*~*/hi595-9hb*~3*gh-a*~*bg-9bgb-ci5/-b9jf76k5b9g*~*-555555do29l0Y3hHjFJM3POpxyJsMjDY*~*5=957___.YzJ1OndhaXRha2VyZXByaW1hcnk6YzpvOmNkMzFiOWRiNjRlNzYwZWExOWZkZjZlZWU4YmI5NjkyOjc6NjQxYjozOTM5M2Y5MjlmZWNkMGUzMGYzMjUxMGFiZDQ0YjU2Mzg5ODdlNDNlNTAyN2VlYjBmMjQxZjc3Mjg5OGNiMWQxOmg6VDpU%3EGet hashmaliciousUnknownBrowse
                                                          • 69.49.245.172
                                                          [EXTERNAL] Fw_ LVW 1201831..emlGet hashmaliciousUnknownBrowse
                                                          • 69.49.230.198
                                                          ATT4802.htmlGet hashmaliciousUnknownBrowse
                                                          • 69.49.245.172
                                                          http://calcuttaclub.in/images/uanjodgs/florida-access/Get hashmaliciousUnknownBrowse
                                                          • 162.214.50.135
                                                          https://public-usa.mkt.dynamics.com/api/orgs/010a432a-e2a3-ef11-8a66-6045bd016f25/r/movKLLTpWUCqpRQQ2_8SfQEAAAA?target=%7B%22TargetUrl%22%3A%22https%253A%252F%252Fapp.seesaw.me%252Fpages%252Fshared_item%253Fitem_id%253Ditem.96abdfb3-93cb-482c-822f-f1d275a42e6e%2526share_token%253DDfLCj_YZQZedsrWVvLwerg%2526mode%253Dshare%22%2C%22RedirectOptions%22%3A%7B%225%22%3Anull%2C%221%22%3Anull%7D%7D&digest=kBeCY6h3I2oKWHussXexCqSpSk%2BEhyyLm0j2TqAuyLY%3D&secretVersion=a587597bbd2d4ba3bb4334f6d8be15eeGet hashmaliciousUnknownBrowse
                                                          • 108.167.188.62
                                                          https://francinecrowley.com/res444.php?4-68747470733a2f2f6a6247772e797a7675666e78632e72752f534e4e6766774f2f-#Get hashmaliciousUnknownBrowse
                                                          • 69.49.245.172
                                                          ship's particulars-TBN.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                          • 50.87.144.157
                                                          lKvXJ7VVCK.exeGet hashmaliciousFormBookBrowse
                                                          • 108.179.253.197
                                                          Finalize_Agreement_DocuSign.pdfGet hashmaliciousCaptcha PhishBrowse
                                                          • 192.254.225.121
                                                          No context
                                                          No context
                                                          No created / dropped files found
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.25923195650576
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:Po-AD841.exe
                                                          File size:590'336 bytes
                                                          MD5:3a527332eb27810c3e18462d2d8cc232
                                                          SHA1:8d1e0ff62107ad61e330224e9f61d5a134b5282c
                                                          SHA256:e18fae2e11693afffb6335ebc29bc17bb298c5644c2790c45b88dd9860bf9e3f
                                                          SHA512:8b73e19e619fe215f599e753175c65016bd173ddd8b0150e71e0d44c9d9a147d9cb222962d42cac997c085cd5c67c508fe76bae82c0bcdfe4a4b678d534bdfff
                                                          SSDEEP:6144:xBNKlTzsZlVeK6Kr2t2Xnu1+rmnhQ2AI5PtNlgmsBMHb+Hsv4xirrWaB+coKkp+7:DNaGVeGr2td4mnhNPJ3Hfv4xXaBGl
                                                          TLSH:CFC4D0683BF89F2EE6BF4A35E07120598F7AF44AD023FB4D0889956D1452790EA50F37
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ... ....@.. .......................`............@................................
                                                          Icon Hash:90cececece8e8eb0
                                                          Entrypoint:0x49171e
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x91C2FBA4 [Sun Jun 30 02:32:04 2047 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x916d00x4b.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x5b6.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x8f7240x8f8007af1e5a08a00ffffeb6d690a604c0469False0.6578441447081882data7.270205838602211IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x920000x5b60x6009f513572db89ca08c2ddf54e496d6d95False0.4192708333333333data4.088618274686686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x940000xc0x200187df521a028f5ea616f28e74db273d7False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_VERSION0x920a00x32cdata0.4236453201970443
                                                          RT_MANIFEST0x923cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 3, 2024 01:24:04.515337944 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:04.635360956 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:04.635443926 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:05.781774998 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:05.782655954 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:05.902565956 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.123326063 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.130235910 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:06.250195980 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.463572025 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.470777988 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:06.590663910 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.812618017 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.812663078 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.812680006 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:06.812711954 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:06.842763901 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:06.962709904 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:07.174700975 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:07.190819979 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:07.310805082 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:07.522597075 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:07.523535013 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:07.643538952 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:07.855701923 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:07.856076002 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:07.976037979 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:08.297349930 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:08.298218966 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:08.418128967 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:08.629730940 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:08.629973888 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:08.749907017 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:08.963659048 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:08.963865042 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:09.083822012 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:09.297333956 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:09.297996044 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:09.298063040 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:09.298096895 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:09.298125982 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:24:09.418015003 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:09.418030977 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:09.418046951 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:09.418088913 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:09.649795055 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:24:09.700193882 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:43.903518915 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:44.023487091 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:44.235225916 CET58749734108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:44.240124941 CET49734587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:55.215745926 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:55.335967064 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:55.336052895 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:56.673012972 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:56.673263073 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:56.793184996 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.023602962 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.042042017 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:57.161962032 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.393353939 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.393889904 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:57.513896942 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.768552065 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.768593073 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.768603086 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:57.768738031 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:57.771725893 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:57.891587973 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:58.134063959 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:58.138331890 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:58.258325100 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:58.488466978 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:58.488773108 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:58.609296083 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:58.839237928 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:58.839467049 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:58.913778067 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:58.959438086 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:58.965795994 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:59.033940077 CET58749862108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:59.042119026 CET49862587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:25:59.085814953 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:25:59.089920044 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:00.311870098 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:00.314223051 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:00.434293032 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:00.656080008 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:00.656223059 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:00.776101112 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:00.998073101 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:01.002264977 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:01.180047035 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:01.364919901 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:01.364979982 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:01.364989996 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:01.367746115 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:01.377986908 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:01.497912884 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:01.719125032 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:01.739079952 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:01.859030008 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:02.079981089 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:02.090064049 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:02.210161924 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:02.431731939 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:02.432056904 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:02.552104950 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:02.774533987 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:02.774734020 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:02.894709110 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.122383118 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.122766972 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.242825031 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.465455055 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.465738058 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.585669041 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.812382936 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.813996077 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.814060926 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.814125061 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.814193964 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.815771103 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.934031010 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.934077978 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.934096098 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.934120893 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.934200048 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.934245110 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.935748100 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.935765982 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.935810089 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.935827017 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.935913086 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.935921907 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.935961008 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.935983896 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.936016083 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.936065912 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.936077118 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.936103106 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.936127901 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.936147928 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.936162949 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.936203003 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:03.936208963 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:03.936243057 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.054049015 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.054109097 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.054131985 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.054179907 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.055742979 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.055788994 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.055828094 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.055891037 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.055990934 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.056040049 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.056087017 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.056123972 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.056130886 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.056173086 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.056217909 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.056226969 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.056273937 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.056317091 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.056380987 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.056428909 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.056525946 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.098721027 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.098773956 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.174109936 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.174185991 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.174199104 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.174263954 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:04.175702095 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.175820112 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.175909996 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.175988913 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176063061 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176163912 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176192999 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176275969 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176414967 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176481009 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176537991 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176547050 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176589012 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176623106 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176682949 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176743031 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176841021 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176851034 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176951885 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.176959991 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.177032948 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.177042007 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.177082062 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.177191019 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.218728065 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.218846083 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.294183969 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.294193983 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.294239044 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.294249058 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.294322014 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.643066883 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:04.793858051 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:05.314757109 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:05.434644938 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:05.656873941 CET58749873108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:05.657310963 CET49873587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:05.659729958 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:05.779637098 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:05.779808044 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:07.017122030 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:07.019864082 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:07.139935970 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:07.383230925 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:07.383867025 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:07.504641056 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:07.735744953 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:07.743726969 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:07.863795042 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.101445913 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.101522923 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.101532936 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.101571083 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:08.103112936 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:08.222927094 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.481458902 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.482268095 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:08.602127075 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.832392931 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:08.832818031 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:08.952792883 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:09.183125019 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:09.183984995 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:09.303834915 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:09.535087109 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:09.535398960 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:09.655261993 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:09.885361910 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:09.887916088 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.007823944 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.239447117 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.239685059 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.359545946 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.589674950 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.590055943 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.590096951 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.590163946 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.590298891 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.591763020 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.710021019 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.710031986 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.710091114 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.710314989 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.710325003 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.710370064 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.711745977 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.711766005 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.711800098 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.711817980 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.711827040 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.711846113 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.711868048 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.711879015 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.711890936 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.711918116 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.711940050 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.711961031 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.712007999 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.712018013 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.712038040 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.712048054 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.712080956 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.830095053 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.830218077 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.830353975 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.831757069 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.831809998 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.831820965 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.831875086 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.831888914 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.831938028 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.831969023 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.832015038 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.832103968 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.832149982 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.832226992 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.832237005 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.832245111 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.832293034 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.832313061 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.832355976 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.832406044 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.878801107 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.878864050 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.950392008 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.950531960 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.951857090 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.951906919 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:10.952020884 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952054024 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952127934 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952208996 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952277899 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952337027 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952440977 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952476978 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952523947 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952533007 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952636003 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952644110 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952666044 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952672958 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952735901 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952785015 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952863932 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952893019 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952948093 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.952990055 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.953053951 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.953113079 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.998869896 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:10.999167919 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:11.071990967 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:11.072000980 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:11.072052956 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:11.072061062 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:11.072154045 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:11.444514036 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:11.519335032 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:15.642630100 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:15.762557983 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:15.992664099 CET58749889108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:15.993134022 CET49889587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:15.994237900 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:16.114093065 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:16.114151001 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:17.357332945 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:17.358000040 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:17.477994919 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:17.708471060 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:17.708651066 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:17.828511000 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.059675932 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.060168028 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:18.180032015 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.422766924 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.422841072 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.422852993 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.422883987 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:18.427333117 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:18.547528982 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.777992010 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:18.778827906 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:18.898693085 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:19.129342079 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:19.130290031 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:19.250158072 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:19.480812073 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:19.482789993 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:19.602746010 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:19.834183931 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:19.837951899 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:19.957914114 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:20.188157082 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:20.188452959 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:20.313586950 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:20.540338039 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:20.540565968 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:20.660589933 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:20.890680075 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:20.891005039 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:20.891093016 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:20.891093016 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:20.891159058 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:20.892205954 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.010961056 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.010999918 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.011063099 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.011157036 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.011158943 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.011725903 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.012187004 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012197971 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012250900 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012312889 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012373924 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012432098 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012442112 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.012501001 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012545109 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012590885 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.012613058 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.012653112 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.015304089 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.111362934 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.131073952 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.131717920 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.131763935 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.132386923 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.132436037 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.132482052 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.132533073 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.132596016 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.132885933 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.132987022 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.135220051 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.135381937 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.139739990 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.178917885 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.183422089 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.231544971 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.235826015 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.251823902 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.254065037 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.259426117 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.259485960 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:21.259682894 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.259763002 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.259771109 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.259810925 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.303356886 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.303487062 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.374128103 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.374198914 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.374361038 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.374370098 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.379708052 CET58749910108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:21.381937981 CET49910587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:22.423918962 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:22.424060106 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:22.545608044 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:22.765377045 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:22.765589952 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:22.885513067 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.107292891 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.115251064 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:23.235215902 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.463727951 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.463800907 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.463810921 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.463901997 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.464890003 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:23.480947971 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:23.600850105 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.822271109 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:23.823148012 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:23.943166971 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:24.164021015 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:24.164309978 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:24.284229040 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:24.505361080 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:24.505618095 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:24.625519037 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:24.847558975 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:24.847783089 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:24.967863083 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.189436913 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.195725918 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.315629959 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.538165092 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.538382053 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.658263922 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.879240036 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.879601002 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.879690886 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.879690886 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.879730940 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.883809090 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.999614000 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.999670982 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.999680042 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.999679089 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:25.999774933 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:25.999813080 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.003760099 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.003812075 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.003823042 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.003870010 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.003871918 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.003882885 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.003926039 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.003969908 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.003993034 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.004014969 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.004033089 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.004090071 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.004101038 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.004138947 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.004168034 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.004173994 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.004215002 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.119585991 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.119640112 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.119695902 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.119743109 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.123848915 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.123904943 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124068975 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124126911 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124223948 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124278069 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124320984 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124366045 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124372959 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124423981 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124459028 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124511957 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124541044 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124596119 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124650002 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124686956 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.124717951 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.124741077 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.166848898 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.166923046 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.239660025 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.239701033 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.239752054 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:26.243824959 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.244085073 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.244203091 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.244426966 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.244571924 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.244756937 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.244843006 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245048046 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245181084 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245320082 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245326996 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245461941 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245470047 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245543003 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245549917 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245657921 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245668888 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245759010 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245774031 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245887041 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245902061 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.245987892 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.246004105 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.246083021 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.286880970 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.287095070 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.360392094 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.360446930 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.360507011 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.360925913 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.360970020 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.712662935 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:26.762588978 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:41.626054049 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:41.746117115 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:41.967288017 CET58749924108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:41.967771053 CET49924587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:41.969132900 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:42.089054108 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:42.089128971 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:43.234761953 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:43.238769054 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:43.358628988 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:43.570441008 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:43.571835041 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:43.691874981 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:43.904347897 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:43.915045023 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:44.035039902 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.259255886 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.259279013 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.259290934 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.259339094 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:44.261243105 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:44.381207943 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.592938900 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.640100002 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:44.759941101 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.973928928 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:44.977859974 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:45.097783089 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:45.310169935 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:45.311985016 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:45.431886911 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:45.705615997 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:45.707849026 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:45.827743053 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.039484978 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.039640903 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.159756899 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.373016119 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.373301029 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.493309021 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.704834938 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.706363916 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.706399918 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.706425905 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.706468105 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.725465059 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.826216936 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.826272964 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.826328039 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.826342106 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.826344967 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.826385021 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.845551014 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845560074 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845612049 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.845624924 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845633984 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845673084 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.845700026 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845706940 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845781088 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.845798969 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845815897 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845837116 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.845865011 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.845875978 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.845921993 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.946131945 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.946202993 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.946290970 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.946340084 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.965698957 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.965781927 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.965802908 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.965857983 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.965874910 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.965918064 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.965986967 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.966033936 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.966057062 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.966101885 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.966120005 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.966176033 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.966195107 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.966243982 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.966259956 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.966310978 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:46.966327906 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:46.966372967 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:47.006989956 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.007046938 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:47.066159964 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.066344023 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.066374063 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:47.066390038 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:26:47.085971117 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086143017 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086186886 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086361885 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086494923 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086592913 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086714029 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086796045 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086877108 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.086982012 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087100029 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087107897 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087115049 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087151051 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087208033 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087266922 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087323904 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087377071 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087431908 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087480068 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087529898 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087621927 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087640047 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.087723017 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.126964092 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.127027035 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.186357975 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.186378002 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.186439037 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.186481953 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.186532021 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.508466005 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:26:47.709789038 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:01.799556017 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:01.919394970 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:02.131129026 CET58749970108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:02.131438971 CET49970587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:02.132402897 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:02.252300024 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:02.252374887 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:03.440236092 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:03.440457106 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:03.560487032 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:03.781992912 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:03.782138109 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:03.902308941 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.123934984 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.124387026 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:04.244271040 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.473398924 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.473453045 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.473463058 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.473495007 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:04.473520041 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.473560095 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:04.475279093 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:04.595139027 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.816140890 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:04.818069935 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:04.937987089 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:05.159126997 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:05.159874916 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:05.279761076 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:05.501305103 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:05.501794100 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:05.621717930 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:05.844100952 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:05.844402075 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:05.964272976 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.185580015 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.185862064 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.305757046 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.529016018 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.529203892 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.649233103 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.870022058 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.870450974 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.870492935 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.870512962 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.870604038 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.872441053 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.990499020 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.990540981 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.990550995 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.990566969 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.990569115 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.990633965 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.992326975 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.992377996 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.992429018 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.992480040 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.992516994 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.992564917 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.992657900 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.992702961 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.992710114 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.992754936 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.992825031 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.992871046 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:06.992902994 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:06.992949009 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.110447884 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.110457897 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.110599041 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.110713959 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.110771894 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.110806942 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.112335920 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.112445116 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.112452030 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.112535000 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.112651110 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.112780094 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.112934113 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.112967968 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.113071918 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.113181114 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.115712881 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.159109116 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.167692900 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.230753899 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.230763912 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.230801105 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.232534885 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.232650995 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.232747078 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.232816935 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.232832909 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.232832909 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:07.232846022 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.232914925 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.233011961 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.233114958 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.233216047 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.235764027 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.235815048 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.235912085 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.235922098 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.236047983 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.236054897 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.236100912 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.236143112 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.236186981 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.287664890 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.287708998 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.352870941 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.352881908 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.352979898 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.352993965 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353091955 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353120089 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353194952 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353224039 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353288889 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353312016 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353415966 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353472948 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353610039 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353662968 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.353671074 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.706598043 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:07.763684988 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:41.347668886 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:41.467885017 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:41.689034939 CET58750014108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:41.691034079 CET50014587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:41.692111015 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:41.812274933 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:41.812396049 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:43.049810886 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:43.049927950 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:43.169838905 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:43.400804043 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:43.403836012 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:43.523703098 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:43.754832029 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:43.755358934 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:43.875232935 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.118315935 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.118329048 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.118339062 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.118391991 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:44.120426893 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:44.240477085 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.471647978 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.473890066 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:44.593838930 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.824419022 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:44.824641943 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:44.944511890 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:45.175307989 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:45.175884008 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:45.295804024 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:45.630331039 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:45.635853052 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:45.755762100 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:45.986283064 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:45.987822056 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.107718945 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.340976000 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.341156960 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.461061954 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.691358089 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.691637993 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.691688061 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.691720009 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.691767931 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.694746971 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.811655045 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.811670065 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.811681032 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.811692953 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.811707973 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.811732054 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.814709902 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.814755917 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.814786911 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.814831972 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.814857006 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.814867020 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.814899921 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.814938068 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.814949036 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.814960003 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.815006018 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.931682110 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.931690931 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.931700945 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.931709051 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.931742907 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.931785107 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.934751987 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.934803009 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.934974909 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.935029030 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.935077906 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.935112953 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.935125113 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.935159922 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.935164928 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.935200930 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.935244083 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.935286999 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.935306072 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.935350895 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:46.979458094 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:46.979509115 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:47.051821947 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.051897049 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:47.051927090 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.051979065 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:47.052016020 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.052076101 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:47.052105904 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.052151918 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:47.054774046 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.054980040 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055089951 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055154085 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055202961 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055325031 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055372953 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055454969 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055541039 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055562019 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055596113 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055682898 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055722952 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055820942 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055830002 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.055879116 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.099473953 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.099533081 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172302961 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172311068 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172414064 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172472000 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172610044 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172619104 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172677040 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172729015 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172812939 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172821999 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172873020 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172913074 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.172964096 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.558706999 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:47.653225899 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:55.532763958 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:55.653657913 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:55.883145094 CET58750016108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:55.884027958 CET50016587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:55.887666941 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:56.007601023 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:56.007781982 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:57.244540930 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:57.251667023 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:57.371634007 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:57.593097925 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:57.593249083 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:57.713092089 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:57.934984922 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:57.935672045 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:58.055531025 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.283632994 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.283696890 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.283713102 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.283741951 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:58.285737038 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:58.408333063 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.626948118 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.629061937 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:58.751091003 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.970141888 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:58.970359087 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:59.090363026 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:59.311886072 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:59.312237024 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:59.432187080 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:59.654639006 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:59.654827118 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:27:59.775535107 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:27:59.996515989 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.000102043 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.120246887 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.343655109 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.343882084 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.463804007 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.684606075 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.684900999 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.684941053 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.684967995 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.685007095 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.690179110 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.806102037 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.806113005 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.806117058 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.806119919 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.806186914 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.810269117 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.810314894 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.810336113 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.810395002 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.810399055 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.810463905 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.810482025 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.810525894 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.810528994 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.810528994 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.810550928 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.810569048 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.926067114 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.926074982 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.926153898 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.926156998 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.926254988 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.930406094 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.930469036 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.930505037 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.930563927 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.930608034 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.930660963 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.930699110 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.930749893 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.930859089 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.930906057 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.930963039 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.931020021 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.931026936 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.931081057 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:00.975389004 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:00.975446939 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:01.046315908 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.046377897 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:01.046471119 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.046536922 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:01.046554089 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.046602964 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:01.050370932 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.050512075 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.050587893 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.050630093 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.050828934 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.050903082 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.050947905 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.050956964 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051045895 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051163912 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051211119 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051249981 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051268101 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051331997 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051348925 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051384926 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.051429987 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.096313953 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.096323013 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166574001 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166582108 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166585922 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166593075 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166600943 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166608095 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166615963 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166625023 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166719913 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166727066 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166822910 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166838884 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.166927099 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.554838896 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:01.606383085 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:03.200803995 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:03.320862055 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:03.518035889 CET50018587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:03.541601896 CET58750017108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:03.541950941 CET50017587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:03.543653965 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:03.637948990 CET58750018108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:03.638058901 CET50018587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:03.663674116 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:03.663742065 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:04.825149059 CET50018587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:04.852696896 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:04.852802038 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:04.873845100 CET58750018108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:04.873920918 CET50018587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:04.878747940 CET50020587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:04.946403980 CET58750018108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:04.946459055 CET50018587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:04.972673893 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:04.999655962 CET58750020108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:04.999723911 CET50020587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:05.195961952 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:05.241419077 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:05.970936060 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:05.971653938 CET50020587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.029670000 CET50021587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.090871096 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.091912985 CET58750020108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.091984987 CET50020587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.149842024 CET58750021108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.149918079 CET50021587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.313380957 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.313750982 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.433680058 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.665221930 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.665236950 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.665247917 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.665263891 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:06.665297031 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.665328026 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.666589022 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:06.786447048 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:07.007755995 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:07.008493900 CET50019587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:07.128623962 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:07.291323900 CET58750021108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:07.340702057 CET50021587192.168.2.4108.179.234.136
                                                          Dec 3, 2024 01:28:07.349570990 CET58750019108.179.234.136192.168.2.4
                                                          Dec 3, 2024 01:28:07.394292116 CET50019587192.168.2.4108.179.234.136
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 3, 2024 01:24:03.891412973 CET5392453192.168.2.41.1.1.1
                                                          Dec 3, 2024 01:24:04.507953882 CET53539241.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Dec 3, 2024 01:24:03.891412973 CET192.168.2.41.1.1.10x9db1Standard query (0)mail.wapination.netA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Dec 3, 2024 01:24:04.507953882 CET1.1.1.1192.168.2.40x9db1No error (0)mail.wapination.net108.179.234.136A (IP address)IN (0x0001)false
                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                          Dec 3, 2024 01:24:05.781774998 CET58749734108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:24:05 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:24:05.782655954 CET49734587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:24:06.123326063 CET58749734108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:24:06.130235910 CET49734587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:24:06.463572025 CET58749734108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:25:56.673012972 CET58749862108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:25:56 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:25:56.673263073 CET49862587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:25:57.023602962 CET58749862108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:25:57.042042017 CET49862587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:25:57.393353939 CET58749862108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:26:00.311870098 CET58749873108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:26:00 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:26:00.314223051 CET49873587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:26:00.656080008 CET58749873108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:26:00.656223059 CET49873587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:26:00.998073101 CET58749873108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:26:07.017122030 CET58749889108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:26:06 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:26:07.019864082 CET49889587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:26:07.383230925 CET58749889108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:26:07.383867025 CET49889587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:26:07.735744953 CET58749889108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:26:17.357332945 CET58749910108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:26:17 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:26:17.358000040 CET49910587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:26:17.708471060 CET58749910108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:26:17.708651066 CET49910587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:26:18.059675932 CET58749910108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:26:22.423918962 CET58749924108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:26:22 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:26:22.424060106 CET49924587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:26:22.765377045 CET58749924108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:26:22.765589952 CET49924587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:26:23.107292891 CET58749924108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:26:43.234761953 CET58749970108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:26:42 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:26:43.238769054 CET49970587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:26:43.570441008 CET58749970108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:26:43.571835041 CET49970587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:26:43.904347897 CET58749970108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:27:03.440236092 CET58750014108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:27:03 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:27:03.440457106 CET50014587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:27:03.781992912 CET58750014108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:27:03.782138109 CET50014587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:27:04.123934984 CET58750014108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:27:43.049810886 CET58750016108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:27:42 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:27:43.049927950 CET50016587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:27:43.400804043 CET58750016108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:27:43.403836012 CET50016587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:27:43.754832029 CET58750016108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:27:57.244540930 CET58750017108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:27:56 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:27:57.251667023 CET50017587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:27:57.593097925 CET58750017108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:27:57.593249083 CET50017587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:27:57.934984922 CET58750017108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:28:04.852696896 CET58750019108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:28:04 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:28:04.852802038 CET50019587192.168.2.4108.179.234.136EHLO 960781
                                                          Dec 3, 2024 01:28:04.873845100 CET58750018108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:28:04 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.
                                                          Dec 3, 2024 01:28:05.195961952 CET58750019108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 960781 [8.46.123.228]
                                                          250-SIZE 52428800
                                                          250-8BITMIME
                                                          250-PIPELINING
                                                          250-PIPECONNECT
                                                          250-AUTH PLAIN LOGIN
                                                          250-STARTTLS
                                                          250 HELP
                                                          Dec 3, 2024 01:28:05.970936060 CET50019587192.168.2.4108.179.234.136STARTTLS
                                                          Dec 3, 2024 01:28:06.313380957 CET58750019108.179.234.136192.168.2.4220 TLS go ahead
                                                          Dec 3, 2024 01:28:07.291323900 CET58750021108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 02 Dec 2024 18:28:06 -0600
                                                          220-We do not authorize the use of this system to transport unsolicited,
                                                          220 and/or bulk e-mail.

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:19:23:57
                                                          Start date:02/12/2024
                                                          Path:C:\Users\user\Desktop\Po-AD841.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\Po-AD841.exe"
                                                          Imagebase:0x360000
                                                          File size:590'336 bytes
                                                          MD5 hash:3A527332EB27810C3E18462D2D8CC232
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1652794160.0000000003799000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:19:23:58
                                                          Start date:02/12/2024
                                                          Path:C:\Users\user\Desktop\Po-AD841.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\Po-AD841.exe"
                                                          Imagebase:0x940000
                                                          File size:590'336 bytes
                                                          MD5 hash:3A527332EB27810C3E18462D2D8CC232
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4113973524.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4115540840.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:8.3%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:80
                                                            Total number of Limit Nodes:7
                                                            execution_graph 16021 dcd358 16022 dcd39e GetCurrentProcess 16021->16022 16024 dcd3e9 16022->16024 16025 dcd3f0 GetCurrentThread 16022->16025 16024->16025 16026 dcd42d GetCurrentProcess 16025->16026 16027 dcd426 16025->16027 16028 dcd463 16026->16028 16027->16026 16029 dcd48b GetCurrentThreadId 16028->16029 16030 dcd4bc 16029->16030 16031 dc4668 16032 dc467a 16031->16032 16033 dc4686 16032->16033 16037 dc4779 16032->16037 16042 dc3e10 16033->16042 16038 dc477c 16037->16038 16046 dc4888 16038->16046 16050 dc4878 16038->16050 16043 dc3e1b 16042->16043 16058 dc5d6c 16043->16058 16045 dc705e 16047 dc48af 16046->16047 16048 dc498c 16047->16048 16054 dc4248 16047->16054 16052 dc487c 16050->16052 16051 dc498c 16051->16051 16052->16051 16053 dc4248 CreateActCtxA 16052->16053 16053->16051 16055 dc5918 CreateActCtxA 16054->16055 16057 dc59db 16055->16057 16059 dc5d77 16058->16059 16062 dc5d8c 16059->16062 16061 dc71bd 16061->16045 16063 dc5d97 16062->16063 16065 dc729a 16063->16065 16066 dc5dbc 16063->16066 16065->16061 16067 dc5dc7 16066->16067 16070 dc5dec 16067->16070 16069 dc738d 16069->16065 16071 dc5df7 16070->16071 16073 dc88eb 16071->16073 16076 dcafa0 16071->16076 16072 dc8929 16072->16069 16073->16072 16081 dcd080 16073->16081 16077 dcafa4 16076->16077 16086 dcafc9 16077->16086 16091 dcafd8 16077->16091 16078 dcafb6 16078->16073 16083 dcd088 16081->16083 16082 dcd0d5 16082->16072 16083->16082 16105 dcd240 16083->16105 16109 dcd231 16083->16109 16087 dcafcc 16086->16087 16095 dcb0bf 16087->16095 16100 dcb0d0 16087->16100 16088 dcafe7 16088->16078 16093 dcb0bf GetModuleHandleW 16091->16093 16094 dcb0d0 GetModuleHandleW 16091->16094 16092 dcafe7 16092->16078 16093->16092 16094->16092 16097 dcb0d0 16095->16097 16096 dcb104 16096->16088 16097->16096 16098 dcb308 GetModuleHandleW 16097->16098 16099 dcb335 16098->16099 16099->16088 16101 dcb104 16100->16101 16102 dcb0e1 16100->16102 16101->16088 16102->16101 16103 dcb308 GetModuleHandleW 16102->16103 16104 dcb335 16103->16104 16104->16088 16107 dcd24d 16105->16107 16106 dcd287 16106->16082 16107->16106 16113 dccb68 16107->16113 16111 dcd23c 16109->16111 16110 dcd287 16110->16082 16111->16110 16112 dccb68 2 API calls 16111->16112 16112->16110 16114 dccb73 16113->16114 16116 dcdb98 16114->16116 16117 dccc94 16114->16117 16116->16116 16118 dccc9f 16117->16118 16119 dc5dec 2 API calls 16118->16119 16120 dcdc07 16119->16120 16120->16116 16121 dcd5a0 16122 dcd5a2 DuplicateHandle 16121->16122 16123 dcd636 16122->16123

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 295 dcd349-dcd3e7 GetCurrentProcess 300 dcd3e9-dcd3ef 295->300 301 dcd3f0-dcd424 GetCurrentThread 295->301 300->301 302 dcd42d-dcd461 GetCurrentProcess 301->302 303 dcd426-dcd42c 301->303 305 dcd46a-dcd485 call dcd527 302->305 306 dcd463-dcd469 302->306 303->302 309 dcd48b-dcd4ba GetCurrentThreadId 305->309 306->305 310 dcd4bc-dcd4c2 309->310 311 dcd4c3-dcd525 309->311 310->311
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00DCD3D6
                                                            • GetCurrentThread.KERNEL32 ref: 00DCD413
                                                            • GetCurrentProcess.KERNEL32 ref: 00DCD450
                                                            • GetCurrentThreadId.KERNEL32 ref: 00DCD4A9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 13e5b422ccc00cbe35d3fb1bffe4d92dab4761f6c34c973d396a4f251bbd647b
                                                            • Instruction ID: 89558c591099725b3f0cf2e1df532a43fb440b2db55c014a3f999d7826a07424
                                                            • Opcode Fuzzy Hash: 13e5b422ccc00cbe35d3fb1bffe4d92dab4761f6c34c973d396a4f251bbd647b
                                                            • Instruction Fuzzy Hash: A65147B0900249CFDB14DFAAD948B9EBBF2EF88304F24C469E119A7361D774A944CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 318 dcd358-dcd3e7 GetCurrentProcess 322 dcd3e9-dcd3ef 318->322 323 dcd3f0-dcd424 GetCurrentThread 318->323 322->323 324 dcd42d-dcd461 GetCurrentProcess 323->324 325 dcd426-dcd42c 323->325 327 dcd46a-dcd485 call dcd527 324->327 328 dcd463-dcd469 324->328 325->324 331 dcd48b-dcd4ba GetCurrentThreadId 327->331 328->327 332 dcd4bc-dcd4c2 331->332 333 dcd4c3-dcd525 331->333 332->333
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00DCD3D6
                                                            • GetCurrentThread.KERNEL32 ref: 00DCD413
                                                            • GetCurrentProcess.KERNEL32 ref: 00DCD450
                                                            • GetCurrentThreadId.KERNEL32 ref: 00DCD4A9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 52c6801f431a842ea82375a002e02a4966ecdfa012b6cb1ed44c8831236fd411
                                                            • Instruction ID: 54302e9258e3ffb988ede3ec44a4a3abf193a0df11b8d8e6006246a925e6ed64
                                                            • Opcode Fuzzy Hash: 52c6801f431a842ea82375a002e02a4966ecdfa012b6cb1ed44c8831236fd411
                                                            • Instruction Fuzzy Hash: 9A5137B0900249CFDB14DFAAD548B9EBBF1EF88314F24C469E119A7360D774A944CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 381 dcb0d0-dcb0df 382 dcb10b-dcb10f 381->382 383 dcb0e1-dcb0ee call dcaaa4 381->383 385 dcb111-dcb11b 382->385 386 dcb123-dcb164 382->386 389 dcb104 383->389 390 dcb0f0 383->390 385->386 392 dcb166-dcb16e 386->392 393 dcb171-dcb17f 386->393 389->382 438 dcb0f6 call dcb358 390->438 439 dcb0f6 call dcb368 390->439 392->393 394 dcb181-dcb186 393->394 395 dcb1a3-dcb1a5 393->395 397 dcb188-dcb18f call dcaab0 394->397 398 dcb191 394->398 400 dcb1a8-dcb1af 395->400 396 dcb0fc-dcb0fe 396->389 399 dcb240-dcb2be 396->399 402 dcb193-dcb1a1 397->402 398->402 431 dcb2c0-dcb2c1 399->431 432 dcb2c2-dcb300 399->432 403 dcb1bc-dcb1c3 400->403 404 dcb1b1-dcb1b9 400->404 402->400 407 dcb1c5-dcb1cd 403->407 408 dcb1d0-dcb1d9 call dcaac0 403->408 404->403 407->408 412 dcb1db-dcb1e3 408->412 413 dcb1e6-dcb1eb 408->413 412->413 414 dcb1ed-dcb1f4 413->414 415 dcb209-dcb216 413->415 414->415 417 dcb1f6-dcb206 call dcaad0 call dcaae0 414->417 422 dcb218-dcb236 415->422 423 dcb239-dcb23f 415->423 417->415 422->423 431->432 433 dcb308-dcb333 GetModuleHandleW 432->433 434 dcb302-dcb305 432->434 435 dcb33c-dcb350 433->435 436 dcb335-dcb33b 433->436 434->433 436->435 438->396 439->396
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00DCB326
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 0415a4c1b39b2184fa8bb1a1c29838b786238ee0c2f75ea845541102767d86a1
                                                            • Instruction ID: 58b0bfb50fd4d80b4de60bf8d1b66ad5f41540e6f87e4c84ffaae922cecb3b02
                                                            • Opcode Fuzzy Hash: 0415a4c1b39b2184fa8bb1a1c29838b786238ee0c2f75ea845541102767d86a1
                                                            • Instruction Fuzzy Hash: 57816570A00B068FD724DF2AD455B6ABBF1FF88310F04892ED086D7A50DB74E849CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 440 dc590d-dc590e 441 dc5910-dc5911 440->441 442 dc5912 440->442 441->442 443 dc5914 442->443 444 dc5916 442->444 443->444 445 dc5918-dc59d9 CreateActCtxA 444->445 447 dc59db-dc59e1 445->447 448 dc59e2-dc5a3c 445->448 447->448 455 dc5a3e-dc5a41 448->455 456 dc5a4b-dc5a4f 448->456 455->456 457 dc5a60 456->457 458 dc5a51-dc5a5d 456->458 460 dc5a61 457->460 458->457 460->460
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 00DC59C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 1da209f73b7a487a6ea3ba5165cdebfac126c7de47ec8e9affdcb664761d6552
                                                            • Instruction ID: 5074366e935733d602a07789189b3596952b60e9c364629afb63f7ef54c95d20
                                                            • Opcode Fuzzy Hash: 1da209f73b7a487a6ea3ba5165cdebfac126c7de47ec8e9affdcb664761d6552
                                                            • Instruction Fuzzy Hash: C841F6B0C0071ACEDF14CFA9D884B9EBBF5BF48304F2481AAD408AB255DB756985CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 461 dc4248-dc59d9 CreateActCtxA 464 dc59db-dc59e1 461->464 465 dc59e2-dc5a3c 461->465 464->465 472 dc5a3e-dc5a41 465->472 473 dc5a4b-dc5a4f 465->473 472->473 474 dc5a60 473->474 475 dc5a51-dc5a5d 473->475 477 dc5a61 474->477 475->474 477->477
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 00DC59C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: cb980d903202436b2c2eb25da2f1d33ebc0f1cbee208ad5f8fd9dbe0b8f8dcc3
                                                            • Instruction ID: b5b206cd6587683a65e68716abdd119fdb20d7a53bce53164887b0ddffe141c0
                                                            • Opcode Fuzzy Hash: cb980d903202436b2c2eb25da2f1d33ebc0f1cbee208ad5f8fd9dbe0b8f8dcc3
                                                            • Instruction Fuzzy Hash: 4141D4B0D00619DBDB24CFA9C844B9EBBB5BF49304F248169D408AB255DB756985CF90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 478 dcd599-dcd59e 479 dcd5a0-dcd5a1 478->479 480 dcd5a2-dcd634 DuplicateHandle 478->480 479->480 481 dcd63d-dcd65a 480->481 482 dcd636-dcd63c 480->482 482->481
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DCD627
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 2c56addb6613d59aef85d1303c254edbba9f85a6b2adf1eaf140ce4b92e8d4c9
                                                            • Instruction ID: 2b3ad069d828c7ed40ecb23d1682473ad2176bb30748b23e89808970dd8c4704
                                                            • Opcode Fuzzy Hash: 2c56addb6613d59aef85d1303c254edbba9f85a6b2adf1eaf140ce4b92e8d4c9
                                                            • Instruction Fuzzy Hash: 2A2114B5D00219DFDB10CF9AD884AEEBFF5EB48314F14802AE918A3310C374A944CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 485 dcd5a0-dcd634 DuplicateHandle 487 dcd63d-dcd65a 485->487 488 dcd636-dcd63c 485->488 488->487
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00DCD627
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 69b44710fde6f228cc46d34707f42eda280e01eb1fc5e9507dfab6e878a014d9
                                                            • Instruction ID: 67c40b28e482b55458021262d3d98e568f70d96a9faeb1e705d7227be814e8ba
                                                            • Opcode Fuzzy Hash: 69b44710fde6f228cc46d34707f42eda280e01eb1fc5e9507dfab6e878a014d9
                                                            • Instruction Fuzzy Hash: A321E4B59002599FDB10CF9AD984ADEBFF5EB48310F14801AE958A3310C374A944CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 491 dcb2c0-dcb300 493 dcb308-dcb333 GetModuleHandleW 491->493 494 dcb302-dcb305 491->494 495 dcb33c-dcb350 493->495 496 dcb335-dcb33b 493->496 494->493 496->495
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00DCB326
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: c885fb7da0c2240e2a1150b055aaacad8a3a9a1bb6cdb0e887c38a62e4157e4a
                                                            • Instruction ID: 8543c4dfab062dcb1e2765caeb19e082a17d10b7d05dc71bc4a76459711301c6
                                                            • Opcode Fuzzy Hash: c885fb7da0c2240e2a1150b055aaacad8a3a9a1bb6cdb0e887c38a62e4157e4a
                                                            • Instruction Fuzzy Hash: 3411DFB5C003498FCB10DF9AD444BDEFBF4AF88324F14846AD859A7210C375A545CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1650281809.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8ed000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0e58b94346c74e01fb01db897d9047f36bed19800cdeeb22c31f49436e860a1a
                                                            • Instruction ID: 900a59333288efdfe501a2735c2c5f80b1aac0d99d27823064260924e3d7c263
                                                            • Opcode Fuzzy Hash: 0e58b94346c74e01fb01db897d9047f36bed19800cdeeb22c31f49436e860a1a
                                                            • Instruction Fuzzy Hash: 53213472504384DFCB05DF15D9C0B2BBF65FB98318F20C569E8098B256C336D85ACBA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1650281809.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8ed000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 52a01a37edb90204163989f884950a7be31d2f3d1a6f9a19f2296a9b93be26b4
                                                            • Instruction ID: 91f59101d64610c2ab96fbc2dd89be288c9f67d89b27eb3bf65dbe2ff8e06f25
                                                            • Opcode Fuzzy Hash: 52a01a37edb90204163989f884950a7be31d2f3d1a6f9a19f2296a9b93be26b4
                                                            • Instruction Fuzzy Hash: 54213A71504384DFDB05DF15D9C0B16BFA5FBA5318F20C169E9098F296C336E85AC7A2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1650311689.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8fd000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4c97e77f110a0c173486c8e44e58f122ff4be602f29d4b8cfe577216ef6c2e75
                                                            • Instruction ID: 419fff927b7d1e2f2e67b815db0a6f8000a29acfd0dbfd396e1d7343e9dadf39
                                                            • Opcode Fuzzy Hash: 4c97e77f110a0c173486c8e44e58f122ff4be602f29d4b8cfe577216ef6c2e75
                                                            • Instruction Fuzzy Hash: 5221F571504708DFDB14DF24D584B26BB66FBC4314F20C569DB098B356CB3AD847CA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1650281809.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8ed000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction ID: 3330c689c45aa7897cbb180579b3747aa3eeee490ab5a841e9b73db756940678
                                                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction Fuzzy Hash: A311B176504380CFCB16CF14D9C4B16BF71FB94318F24C6AAD8494B656C336D85ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1650281809.00000000008ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 008ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8ed000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction ID: d49b323c82fef08a63c33289d743884465759cfbb7c2b71d25de91e8c9da7651
                                                            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                            • Instruction Fuzzy Hash: 1311DF76404380CFCB02CF00D5C4B16BF71FBA4328F24C2A9D8094B256C33AE85ACBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1650311689.00000000008FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 008FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_8fd000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: d2cfdcd8f217cc85eaa34925b9b3920171c4983938793c1bba417af50da9b747
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: 4A11BE75504784CFCB15CF24D5C4B25FB62FB84314F24C6AADA098B656C33AD80ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1651504005.0000000000DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DC0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 308c121c688bca5af97a95ee79809076b95b988b016b03758fdad6d5add276d5
                                                            • Instruction ID: 7136d451306358689948355d7a55980159291e3551fe2b7469bf06c29779bc16
                                                            • Opcode Fuzzy Hash: 308c121c688bca5af97a95ee79809076b95b988b016b03758fdad6d5add276d5
                                                            • Instruction Fuzzy Hash: B7A14A32A1020A8FCF05DFA5C840ADEB7B3FF84300B25457EE906AB265DB31D955CB60

                                                            Execution Graph

                                                            Execution Coverage:11.2%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:156
                                                            Total number of Limit Nodes:16
                                                            execution_graph 39593 1490848 39595 149084e 39593->39595 39594 149091b 39595->39594 39598 14914f8 39595->39598 39607 14913e3 39595->39607 39600 14913ee 39598->39600 39601 14914fb 39598->39601 39599 14914e8 39599->39595 39600->39599 39602 14914f8 7 API calls 39600->39602 39615 63c56b8 39600->39615 39619 63c56c8 39600->39619 39623 1496fe0 39600->39623 39627 1496fdb 39600->39627 39601->39595 39602->39600 39609 14913ee 39607->39609 39608 14914e8 39608->39595 39609->39608 39610 14914f8 7 API calls 39609->39610 39611 1496fdb 6 API calls 39609->39611 39612 1496fe0 6 API calls 39609->39612 39613 63c56b8 KiUserCallbackDispatcher 39609->39613 39614 63c56c8 KiUserCallbackDispatcher 39609->39614 39610->39609 39611->39609 39612->39609 39613->39609 39614->39609 39616 63c56c2 39615->39616 39617 63c578b 39616->39617 39631 63c55c4 39616->39631 39617->39600 39620 63c56da 39619->39620 39621 63c578b 39620->39621 39622 63c55c4 KiUserCallbackDispatcher 39620->39622 39621->39600 39622->39621 39625 1496fea 39623->39625 39624 149705e 39624->39600 39625->39624 39639 1499c8c 39625->39639 39629 1496fea 39627->39629 39628 149705e 39628->39600 39629->39628 39630 1499c8c 6 API calls 39629->39630 39630->39629 39632 63c55cf 39631->39632 39634 63c91b3 39632->39634 39635 63c7624 39632->39635 39634->39617 39636 63c91c8 KiUserCallbackDispatcher 39635->39636 39638 63c9236 39636->39638 39638->39632 39641 1499cfb 39639->39641 39640 1499eaf 39640->39625 39641->39640 39642 1499e0f GetActiveWindow 39641->39642 39643 1499e3d 39641->39643 39642->39643 39643->39640 39647 149a6a8 39643->39647 39651 149a6e0 39643->39651 39655 149a6b8 39643->39655 39648 149a6b8 39647->39648 39659 1499b80 39648->39659 39652 149a6f0 39651->39652 39653 149a70d 39652->39653 39676 1499b90 39652->39676 39653->39640 39656 149a6c1 39655->39656 39657 1499b80 5 API calls 39656->39657 39658 149a6cc 39657->39658 39658->39640 39660 1499b8b 39659->39660 39663 149b6ec 39660->39663 39662 149b932 39664 149b6f7 39663->39664 39665 149a6e0 4 API calls 39664->39665 39668 149ba11 39664->39668 39666 149ba2b 39665->39666 39669 149b7d4 39666->39669 39668->39662 39671 149b7df 39669->39671 39670 149bd4b 39670->39668 39671->39670 39673 149b7f0 39671->39673 39674 149bd80 OleInitialize 39673->39674 39675 149bde4 39674->39675 39675->39670 39677 1499b9b GetCurrentProcess 39676->39677 39679 149ad99 39677->39679 39680 149ada0 GetCurrentThread 39677->39680 39679->39680 39681 149addd GetCurrentProcess 39680->39681 39682 149add6 39680->39682 39683 149ae13 39681->39683 39682->39681 39684 149ae3b GetCurrentThreadId 39683->39684 39685 149ae6c 39684->39685 39685->39653 39686 63c4b58 39689 63c4b80 39686->39689 39687 63c4b66 39690 63c4b8a 39689->39690 39691 63c4b9d 39689->39691 39690->39691 39692 63c4cae GlobalMemoryStatusEx 39690->39692 39691->39687 39693 63c4cde 39692->39693 39693->39687 39772 63c9ae8 39773 63c9b1a OleGetClipboard 39772->39773 39775 63c9b82 39773->39775 39694 149b96f 39697 149b6fc 39694->39697 39698 149b707 39697->39698 39701 149cb30 39698->39701 39699 149b97c 39702 149cb36 GetCurrentThreadId 39701->39702 39704 149cbd5 39702->39704 39704->39699 39705 149cfc0 39706 149d005 MessageBoxW 39705->39706 39708 149d04c 39706->39708 39776 149af50 DuplicateHandle 39777 149afe6 39776->39777 39778 149cc30 39779 149cc7e EnumThreadWindows 39778->39779 39780 149cc74 39778->39780 39781 149ccb0 39779->39781 39780->39779 39709 63cb630 39710 63cb674 SetWindowsHookExA 39709->39710 39712 63cb6ba 39710->39712 39713 63c7d70 39714 63c7dd8 CreateWindowExW 39713->39714 39716 63c7e94 39714->39716 39782 63c7240 39783 63c7288 GetModuleHandleW 39782->39783 39784 63c7282 39782->39784 39785 63c72b5 39783->39785 39784->39783 39717 12ad104 39718 12ad11c 39717->39718 39719 12ad176 39718->39719 39725 63c7f28 39718->39725 39731 63c8bf0 39718->39731 39739 63c7f77 39718->39739 39746 63c74b4 39718->39746 39754 63c7f18 39718->39754 39726 63c7f3b 39725->39726 39727 63c7f4e 39726->39727 39730 63c7f77 CallWindowProcW 39726->39730 39728 63c74b4 CallWindowProcW 39727->39728 39729 63c7f6f 39728->39729 39729->39719 39730->39727 39732 63c8c00 39731->39732 39733 63c8c61 39732->39733 39735 63c8c51 39732->39735 39736 63c8c5f 39733->39736 39768 63c75cc 39733->39768 39760 63c8d78 39735->39760 39764 63c8d88 39735->39764 39740 63c7f3b 39739->39740 39742 63c7f87 39739->39742 39741 63c7f4e 39740->39741 39745 63c7f77 CallWindowProcW 39740->39745 39743 63c74b4 CallWindowProcW 39741->39743 39742->39719 39744 63c7f6f 39743->39744 39744->39719 39745->39741 39747 63c74bf 39746->39747 39748 63c8c61 39747->39748 39750 63c8c51 39747->39750 39749 63c75cc CallWindowProcW 39748->39749 39751 63c8c5f 39748->39751 39749->39751 39752 63c8d78 CallWindowProcW 39750->39752 39753 63c8d88 CallWindowProcW 39750->39753 39752->39751 39753->39751 39755 63c7f28 39754->39755 39756 63c7f4e 39755->39756 39759 63c7f77 CallWindowProcW 39755->39759 39757 63c74b4 CallWindowProcW 39756->39757 39758 63c7f6f 39757->39758 39758->39719 39759->39756 39761 63c8d88 39760->39761 39762 63c75cc CallWindowProcW 39761->39762 39763 63c8e6e 39761->39763 39762->39761 39763->39736 39765 63c8d96 39764->39765 39766 63c75cc CallWindowProcW 39765->39766 39767 63c8e6e 39765->39767 39766->39765 39767->39736 39769 63c75d7 39768->39769 39770 63c8f22 CallWindowProcW 39769->39770 39771 63c8ed1 39769->39771 39770->39771 39771->39736
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                            • API String ID: 0-2392861976
                                                            • Opcode ID: d7a67c8e91bc740283f02310076b9e5136e12280599720801fd6346370cb7898
                                                            • Instruction ID: 6a4efd80c4feff8b04b83ea693e48d0d74b5a381dcaefaf064926f410d8a794e
                                                            • Opcode Fuzzy Hash: d7a67c8e91bc740283f02310076b9e5136e12280599720801fd6346370cb7898
                                                            • Instruction Fuzzy Hash: 5FD25934E003098FCB64EB68C594AADB7B2FF85314F54C5A9D449AB365DB34EC89CB80

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1268 638be00-638be1e 1269 638be20-638be23 1268->1269 1270 638be25-638be41 1269->1270 1271 638be46-638be49 1269->1271 1270->1271 1272 638be4b-638be55 1271->1272 1273 638be56-638be59 1271->1273 1275 638be7a-638be7d 1273->1275 1276 638be5b-638be75 1273->1276 1277 638be7f-638be8d 1275->1277 1278 638be94-638be96 1275->1278 1276->1275 1284 638bea6-638bebc 1277->1284 1286 638be8f 1277->1286 1280 638be98 1278->1280 1281 638be9d-638bea0 1278->1281 1280->1281 1281->1269 1281->1284 1288 638bec2-638becb 1284->1288 1289 638c0d7-638c0e1 1284->1289 1286->1278 1290 638bed1-638beee 1288->1290 1291 638c0e2-638c0e8 1288->1291 1298 638c0c4-638c0d1 1290->1298 1299 638bef4-638bf1c 1290->1299 1294 638c0ea-638c117 1291->1294 1295 638c0a1-638c0a6 1291->1295 1297 638c119-638c11c 1294->1297 1305 638c0b2-638c0be 1295->1305 1300 638c348-638c34b 1297->1300 1301 638c122-638c131 1297->1301 1298->1288 1298->1289 1299->1298 1308 638bf22-638bf2b 1299->1308 1303 638c351-638c35d 1300->1303 1304 638c402-638c405 1300->1304 1315 638c150-638c18b 1301->1315 1316 638c133-638c14e 1301->1316 1311 638c368-638c36a 1303->1311 1306 638c428-638c42a 1304->1306 1307 638c407-638c423 1304->1307 1305->1298 1305->1308 1312 638c42c 1306->1312 1313 638c431-638c434 1306->1313 1307->1306 1308->1291 1314 638bf31-638bf4d 1308->1314 1318 638c36c-638c372 1311->1318 1319 638c382-638c389 1311->1319 1312->1313 1313->1297 1320 638c43a-638c443 1313->1320 1314->1305 1333 638bf53-638bf7d call 6388220 1314->1333 1331 638c31c-638c332 1315->1331 1332 638c191-638c1a2 1315->1332 1316->1315 1323 638c374 1318->1323 1324 638c376-638c378 1318->1324 1325 638c39a 1319->1325 1326 638c38b-638c398 1319->1326 1323->1319 1324->1319 1329 638c39f-638c3a1 1325->1329 1326->1329 1336 638c3b8-638c3f1 1329->1336 1337 638c3a3-638c3a6 1329->1337 1331->1300 1341 638c1a8-638c1c5 1332->1341 1342 638c307-638c316 1332->1342 1350 638c0a8-638c0ad 1333->1350 1351 638bf83-638bfab 1333->1351 1336->1301 1359 638c3f7-638c401 1336->1359 1337->1320 1341->1342 1354 638c1cb-638c2c1 call 638a620 1341->1354 1342->1331 1342->1332 1350->1305 1351->1350 1362 638bfb1-638bfdf 1351->1362 1404 638c2cf 1354->1404 1405 638c2c3-638c2cd 1354->1405 1362->1350 1367 638bfe5-638bfee 1362->1367 1367->1350 1369 638bff4-638c026 1367->1369 1376 638c028-638c02c 1369->1376 1377 638c031-638c04d 1369->1377 1376->1350 1378 638c02e 1376->1378 1377->1305 1379 638c04f-638c09f call 638a620 1377->1379 1378->1377 1379->1295 1406 638c2d4-638c2d6 1404->1406 1405->1406 1406->1342 1407 638c2d8-638c2dd 1406->1407 1408 638c2eb 1407->1408 1409 638c2df-638c2e9 1407->1409 1410 638c2f0-638c2f2 1408->1410 1409->1410 1410->1342 1411 638c2f4-638c300 1410->1411 1411->1342
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q
                                                            • API String ID: 0-355816377
                                                            • Opcode ID: 14f46db9ea8ffc35cbc948fd69b5ef487947f4327bed398bf6f904319f34d069
                                                            • Instruction ID: f2ffb7b829f639bc9c7fd85c45707735a88395b48145588a61afaf14efcdbdb4
                                                            • Opcode Fuzzy Hash: 14f46db9ea8ffc35cbc948fd69b5ef487947f4327bed398bf6f904319f34d069
                                                            • Instruction Fuzzy Hash: 0F02AF31B002198FDB54EB78D9906AEB7A2FF84304F148569D406DB394DB35EC8ACBD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 93e003f8cea5052b900182fa169fc2aa24d17c6e4dbf9c5d6b42ad00e6cf35f7
                                                            • Instruction ID: 58151dcccb5108085e79b93236d9c9d52f61611ec34528f75614b849b44a12d2
                                                            • Opcode Fuzzy Hash: 93e003f8cea5052b900182fa169fc2aa24d17c6e4dbf9c5d6b42ad00e6cf35f7
                                                            • Instruction Fuzzy Hash: 1363E731D10B1A8EDB51EB68C8805D9F7B1FF99300F15D69AE4587B221EB70AAC5CF81
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f5df4e74cf268528b3dea80468f0c3f2b6af83c62dd0cefdda2ff666f9240308
                                                            • Instruction ID: bb33ef494c854e2979d03afdb7716595a502d55142d56eb74d3ccca4af8bb032
                                                            • Opcode Fuzzy Hash: f5df4e74cf268528b3dea80468f0c3f2b6af83c62dd0cefdda2ff666f9240308
                                                            • Instruction Fuzzy Hash: 9D330C31D107198EDB51EF68C8906EDF7B1FF99300F15C69AE458A7221EB70AAC5CB81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $
                                                            • API String ID: 0-3993045852
                                                            • Opcode ID: 0464c72c07e50c1a88e8d7b50e5da8a79c115b3f6352cfaa573eff49a4c58d15
                                                            • Instruction ID: b0d73056630a4db2ff0e7dde82edf4e976ff2675bffd2b0f03f18ef2802dca18
                                                            • Opcode Fuzzy Hash: 0464c72c07e50c1a88e8d7b50e5da8a79c115b3f6352cfaa573eff49a4c58d15
                                                            • Instruction Fuzzy Hash: 0922A031E003199FDB65EBA8C8807EEB7B2EF85310F248469D459AB384DA35DD46CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 654df7dd4a471a316c02717f53d7a3c7a197ceb6e07d12b3a6f876985da5deaa
                                                            • Instruction ID: 9ddcc9c9820195b7192fe40e3f70c837e1657872113c98e95fff19c1a6ac8864
                                                            • Opcode Fuzzy Hash: 654df7dd4a471a316c02717f53d7a3c7a197ceb6e07d12b3a6f876985da5deaa
                                                            • Instruction Fuzzy Hash: 59629135B003098FDB64EB68D594AADB7F2EF84314F14852AD41ADB394DB35EC4ACB90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ad40d947ea94fca9a3a2b569f488478151a2ae06ac9f06ede968b943e727228
                                                            • Instruction ID: 1f0f00d07803b0c5637b5fbf4c3da304147888fb8ff207a512dc46964f324d32
                                                            • Opcode Fuzzy Hash: 0ad40d947ea94fca9a3a2b569f488478151a2ae06ac9f06ede968b943e727228
                                                            • Instruction Fuzzy Hash: 3A226130E103098FDF64EA69D5807EDB7B2FB85350F20892AE449DB395DA35DC89CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 638ed50-638ed6e 1 638ed70-638ed73 0->1 2 638ed75-638ed91 1->2 3 638ed96-638ed99 1->3 2->3 4 638ed9b-638eda4 3->4 5 638edb3-638edb6 3->5 6 638edaa-638edae 4->6 7 638ef87-638ef95 4->7 8 638edb8-638edbc 5->8 9 638edc7-638edca 5->9 6->5 19 638ef9e-638ef9f 7->19 20 638ef97-638ef99 7->20 11 638ef7c-638ef86 8->11 12 638edc2 8->12 13 638edcc-638eddf 9->13 14 638ede4-638ede7 9->14 12->9 13->14 17 638ede9-638edee 14->17 18 638edf1-638edf4 14->18 17->18 22 638ee04-638ee07 18->22 23 638edf6-638edff 18->23 27 638efa2-638efbe 19->27 26 638ef9b-638ef9c 20->26 20->27 24 638ef6d-638ef76 22->24 25 638ee0d-638ee10 22->25 23->22 24->4 24->11 28 638ee12-638ee1f call 63881f4 25->28 29 638ee24-638ee26 25->29 26->19 30 638efc0-638efc3 27->30 28->29 32 638ee28 29->32 33 638ee2d-638ee30 29->33 34 638efd0-638efd3 30->34 35 638efc5-638efc9 30->35 32->33 33->1 37 638ee36-638ee5a 33->37 40 638efe2-638efe5 34->40 41 638efd5 call 638f2a8 34->41 38 638effb-638f036 35->38 39 638efcb 35->39 58 638ef6a 37->58 59 638ee60-638ee6f 37->59 48 638f229-638f23c 38->48 49 638f03c-638f048 38->49 39->34 42 638eff2-638eff5 40->42 43 638efe7-638eff1 40->43 44 638efdb-638efdd 41->44 42->38 46 638f25e-638f261 42->46 44->40 50 638f263-638f27f 46->50 51 638f284-638f286 46->51 52 638f23e 48->52 61 638f068-638f0ac 49->61 62 638f04a-638f063 49->62 50->51 54 638f288 51->54 55 638f28d-638f290 51->55 52->46 54->55 55->30 60 638f296-638f2a0 55->60 58->24 66 638ee71-638ee77 59->66 67 638ee87-638eec2 call 638a620 59->67 79 638f0c8-638f107 61->79 80 638f0ae-638f0c0 61->80 62->52 68 638ee79 66->68 69 638ee7b-638ee7d 66->69 84 638eeda-638eef1 67->84 85 638eec4-638eeca 67->85 68->67 69->67 86 638f10d-638f1e8 call 638a620 79->86 87 638f1ee-638f203 79->87 80->79 96 638ef09-638ef1a 84->96 97 638eef3-638eef9 84->97 88 638eecc 85->88 89 638eece-638eed0 85->89 86->87 87->48 88->84 89->84 103 638ef1c-638ef22 96->103 104 638ef32-638ef63 96->104 99 638eefb 97->99 100 638eefd-638eeff 97->100 99->96 100->96 106 638ef24 103->106 107 638ef26-638ef28 103->107 104->58 106->104 107->104
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                            • API String ID: 0-3823777903
                                                            • Opcode ID: 235c0d193c27db27ab5665b2cb16875c32ff2770b3e0486337c4ac2a0c543449
                                                            • Instruction ID: f7b45a24b5c049531dc09818ef497afdf9e3f52aa6f54d1061d931ce5944c128
                                                            • Opcode Fuzzy Hash: 235c0d193c27db27ab5665b2cb16875c32ff2770b3e0486337c4ac2a0c543449
                                                            • Instruction Fuzzy Hash: BCE15C30E1030A8FDF65EF69D4946AEB7B2EF94304F208929D4099B354DB35EC4ACB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 579 638f6d8-638f6fa 580 638f6fc-638f6ff 579->580 581 638f86e-638f871 580->581 582 638f705-638f708 580->582 585 638f876-638f879 581->585 583 638f70a-638f767 call 638a620 582->583 584 638f76c-638f76f 582->584 583->584 586 638f771-638f772 584->586 587 638f777-638f77a 584->587 588 638f87b-638f87d 585->588 589 638f880-638f883 585->589 586->587 590 638f7b8-638f7bb 587->590 591 638f77c-638f791 587->591 588->589 593 638f89a-638f89d 589->593 594 638f885-638f889 589->594 590->581 597 638f7c1-638f7c4 590->597 595 638fa7b-638fab6 591->595 613 638f797-638f7b3 591->613 598 638f8af-638f8b2 593->598 599 638f89f 593->599 594->595 596 638f88f-638f895 594->596 614 638fab8-638fabb 595->614 596->593 601 638f7e6-638f7e9 597->601 602 638f7c6-638f7e1 597->602 603 638f8c2-638f8c5 598->603 604 638f8b4-638f8bd 598->604 608 638f8a7-638f8aa 599->608 611 638f7eb-638f7ef 601->611 612 638f810-638f813 601->612 602->601 609 638f8d1-638f8d4 603->609 610 638f8c7-638f8ca 603->610 604->603 608->598 619 638f8e4-638f8e7 609->619 620 638f8d6-638f8df 609->620 616 638f8cc 610->616 617 638f913-638f916 610->617 611->595 618 638f7f5-638f805 611->618 621 638f815-638f81c 612->621 622 638f827-638f82a 612->622 613->590 628 638fabd-638fad9 614->628 629 638fade-638fae1 614->629 616->609 617->595 630 638f91c-638f923 617->630 631 638f8e9-638f8ed 618->631 649 638f80b 618->649 619->631 632 638f90e-638f911 619->632 620->619 621->620 624 638f822 621->624 626 638f82c-638f830 622->626 627 638f84d-638f850 622->627 624->622 626->595 634 638f836-638f846 626->634 637 638f860-638f863 627->637 638 638f852-638f85b 627->638 628->629 639 638fd4d-638fd4f 629->639 640 638fae7-638fb0f 629->640 635 638f928-638f92b 630->635 631->595 642 638f8f3-638f903 631->642 632->617 632->635 634->581 659 638f848 634->659 635->581 643 638f931-638f934 635->643 647 638f869-638f86c 637->647 648 638f9b1-638f9ba 637->648 638->637 645 638fd51 639->645 646 638fd56-638fd59 639->646 680 638fb19-638fb5d 640->680 681 638fb11-638fb14 640->681 642->626 658 638f909 642->658 654 638f936-638f93f 643->654 655 638f951-638f954 643->655 645->646 646->614 656 638fd5f-638fd68 646->656 647->581 647->585 653 638f9c0 648->653 648->654 649->612 660 638f9c5-638f9c8 653->660 654->595 661 638f945-638f94c 654->661 663 638f961-638f964 655->663 664 638f956-638f95c 655->664 658->632 659->627 666 638f9ca-638f9ce 660->666 667 638f9df-638f9e2 660->667 661->655 668 638f9a3-638f9a6 663->668 669 638f966-638f97b 663->669 664->663 666->595 672 638f9d4-638f9da 666->672 673 638f9ec-638f9ef 667->673 674 638f9e4-638f9e9 667->674 668->610 671 638f9ac-638f9af 668->671 669->595 684 638f981-638f99e 669->684 671->648 671->660 672->667 677 638f9f9-638f9fc 673->677 678 638f9f1-638f9f4 673->678 674->673 682 638fa0c-638fa0f 677->682 683 638f9fe-638fa07 677->683 678->677 701 638fd42-638fd4c 680->701 702 638fb63-638fb6c 680->702 681->656 685 638fa11-638fa1d 682->685 686 638fa22-638fa25 682->686 683->682 684->668 685->686 688 638fa38-638fa3b 686->688 689 638fa27-638fa2b 686->689 693 638fa3d-638fa59 688->693 694 638fa5e-638fa60 688->694 689->595 692 638fa2d-638fa33 689->692 692->688 693->694 696 638fa62 694->696 697 638fa67-638fa6a 694->697 696->697 697->580 699 638fa70-638fa7a 697->699 704 638fd38-638fd3d 702->704 705 638fb72-638fbde call 638a620 702->705 704->701 713 638fcd8-638fced 705->713 714 638fbe4-638fbe9 705->714 713->704 716 638fbeb-638fbf1 714->716 717 638fc05 714->717 718 638fbf3-638fbf5 716->718 719 638fbf7-638fbf9 716->719 720 638fc07-638fc0d 717->720 721 638fc03 718->721 719->721 722 638fc0f-638fc15 720->722 723 638fc22-638fc2f 720->723 721->720 724 638fc1b 722->724 725 638fcc3-638fcd2 722->725 729 638fc31-638fc37 723->729 730 638fc47-638fc54 723->730 724->723 727 638fc8a-638fc97 724->727 728 638fc56-638fc63 724->728 725->713 725->714 736 638fc99-638fc9f 727->736 737 638fcaf-638fcbc 727->737 739 638fc7b-638fc88 728->739 740 638fc65-638fc6b 728->740 732 638fc39 729->732 733 638fc3b-638fc3d 729->733 730->725 732->730 733->730 741 638fca1 736->741 742 638fca3-638fca5 736->742 737->725 739->725 743 638fc6d 740->743 744 638fc6f-638fc71 740->744 741->737 742->737 743->739 744->739
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                            • API String ID: 0-2392861976
                                                            • Opcode ID: b8bc61897d0aa73c447bda6489eea08aece21f60b6050c26ce3cd284b96a4423
                                                            • Instruction ID: ced7b7f4a329cb8a718d39a6554bc706615c00f74eee4de5893492c3f8e9d77d
                                                            • Opcode Fuzzy Hash: b8bc61897d0aa73c447bda6489eea08aece21f60b6050c26ce3cd284b96a4423
                                                            • Instruction Fuzzy Hash: 3F026B30E103098FDB64EB69D580AEDB7B1FB85390F20892AD409DB355DB35ED89CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 747 1499b90-149ad97 GetCurrentProcess 753 149ad99-149ad9f 747->753 754 149ada0-149add4 GetCurrentThread 747->754 753->754 755 149addd-149ae11 GetCurrentProcess 754->755 756 149add6-149addc 754->756 758 149ae1a-149ae35 call 149aed8 755->758 759 149ae13-149ae19 755->759 756->755 762 149ae3b-149ae6a GetCurrentThreadId 758->762 759->758 763 149ae6c-149ae72 762->763 764 149ae73-149aed5 762->764 763->764
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 0149AD86
                                                            • GetCurrentThread.KERNEL32 ref: 0149ADC3
                                                            • GetCurrentProcess.KERNEL32 ref: 0149AE00
                                                            • GetCurrentThreadId.KERNEL32 ref: 0149AE59
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: d0b3d629267bc63442a617bf8467ed72b5c6c0eeace17c95653223369b05a5b8
                                                            • Instruction ID: f661f6c46c6277226e5fca5da9a46f1e11dbf4f5cf277a5ae76d773906c299ba
                                                            • Opcode Fuzzy Hash: d0b3d629267bc63442a617bf8467ed72b5c6c0eeace17c95653223369b05a5b8
                                                            • Instruction Fuzzy Hash: A35133B49112498FDB14DFA9D588BAEFFF1EB88314F20845AE019A7260DB349984CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 771 149ad06-149ad97 GetCurrentProcess 775 149ad99-149ad9f 771->775 776 149ada0-149add4 GetCurrentThread 771->776 775->776 777 149addd-149ae11 GetCurrentProcess 776->777 778 149add6-149addc 776->778 780 149ae1a-149ae35 call 149aed8 777->780 781 149ae13-149ae19 777->781 778->777 784 149ae3b-149ae6a GetCurrentThreadId 780->784 781->780 785 149ae6c-149ae72 784->785 786 149ae73-149aed5 784->786 785->786
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 0149AD86
                                                            • GetCurrentThread.KERNEL32 ref: 0149ADC3
                                                            • GetCurrentProcess.KERNEL32 ref: 0149AE00
                                                            • GetCurrentThreadId.KERNEL32 ref: 0149AE59
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 8251e21d67aea5cfbd28ab628c0767121be278942a7cece8f171c854fcc816ea
                                                            • Instruction ID: 76b4077a691e677b2ef8b9b1e6dcbd4fc178b7ac0c1b227c0615523bdbbce7d6
                                                            • Opcode Fuzzy Hash: 8251e21d67aea5cfbd28ab628c0767121be278942a7cece8f171c854fcc816ea
                                                            • Instruction Fuzzy Hash: A55122B4D10249CFDB14DFA9D548BAEBFF1EB88314F20845AE059AB360DB349984CF65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 793 1499c8c-1499d1a 797 1499f5e-1499f91 793->797 798 1499d20-1499d45 793->798 803 1499f98-1499fcd 797->803 798->803 804 1499d4b-1499d70 798->804 811 1499fd4-149a009 803->811 804->811 812 1499d76-1499d86 804->812 818 149a010-149a03c 811->818 817 1499d8c-1499d90 812->817 812->818 819 1499d9e-1499da3 817->819 820 1499d92-1499d98 817->820 823 149a043-149a081 818->823 824 1499db1-1499db7 819->824 825 1499da5-1499dab 819->825 820->819 820->823 826 149a088-149a0c6 823->826 828 1499db9-1499dc1 824->828 829 1499dc8-1499ddc 824->829 825->824 825->826 862 149a0cd-149a156 826->862 828->829 841 1499dde-1499de0 829->841 842 1499de2 829->842 844 1499de7-1499dff 841->844 842->844 847 1499e09-1499e0d 844->847 848 1499e01-1499e07 844->848 851 1499e0f-1499e3b GetActiveWindow 847->851 852 1499e50-1499e59 847->852 848->847 850 1499e5c-1499e69 848->850 860 1499ea9 850->860 861 1499e6b-1499e81 call 1499968 850->861 854 1499e3d-1499e43 851->854 855 1499e44-1499e4e 851->855 852->850 854->855 855->850 892 1499ea9 call 149a6a8 860->892 893 1499ea9 call 149a6b8 860->893 894 1499ea9 call 149a6e0 860->894 871 1499ea0-1499ea6 861->871 872 1499e83-1499e9a 861->872 889 149a158-149a161 862->889 890 149a163 862->890 864 1499eaf-1499f03 call 1499974 884 1499f0c 864->884 871->860 872->862 872->871 884->797 891 149a165-149a16b 889->891 890->891 892->864 893->864 894->864
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: ActiveWindow
                                                            • String ID: Hbq$Hbq
                                                            • API String ID: 2558294473-4258043069
                                                            • Opcode ID: 8d305fb6e21b55135483d8477f58cf46e8d0a079e469761e5da4403fa3d7dcda
                                                            • Instruction ID: fcfeae03ab9d9505cc68fa112d7ba39cd33c3c33d4771e2b0060ea9ce5719e9c
                                                            • Opcode Fuzzy Hash: 8d305fb6e21b55135483d8477f58cf46e8d0a079e469761e5da4403fa3d7dcda
                                                            • Instruction Fuzzy Hash: 8BC18A70F002599FDF18AFB9C4547AE7BE6BB88340F148429E50AAB390DF349C46CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 895 638d1d0-638d1f5 896 638d1f7-638d1fa 895->896 897 638d1fc-638d21b 896->897 898 638d220-638d223 896->898 897->898 899 638d229-638d23e 898->899 900 638dae3-638dae5 898->900 907 638d240-638d246 899->907 908 638d256-638d26c 899->908 902 638daec-638daef 900->902 903 638dae7 900->903 902->896 905 638daf5-638daff 902->905 903->902 909 638d248 907->909 910 638d24a-638d24c 907->910 912 638d277-638d279 908->912 909->908 910->908 913 638d27b-638d281 912->913 914 638d291-638d302 912->914 915 638d283 913->915 916 638d285-638d287 913->916 925 638d32e-638d34a 914->925 926 638d304-638d327 914->926 915->914 916->914 931 638d34c-638d36f 925->931 932 638d376-638d391 925->932 926->925 931->932 937 638d3bc-638d3d7 932->937 938 638d393-638d3b5 932->938 943 638d3d9-638d3fb 937->943 944 638d402-638d40c 937->944 938->937 943->944 945 638d41c-638d496 944->945 946 638d40e-638d417 944->946 952 638d498-638d4b6 945->952 953 638d4e3-638d4f8 945->953 946->905 957 638d4b8-638d4c7 952->957 958 638d4d2-638d4e1 952->958 953->900 957->958 958->952 958->953
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q
                                                            • API String ID: 0-2125118731
                                                            • Opcode ID: b0c467328156de0c5ac949f1a416f5cb14778d2def34c900657a5c1b295a3ac8
                                                            • Instruction ID: 1e7d1cd277e7b8495b433879bc2f32272477c5914ea6492c5ea03fd5d0344602
                                                            • Opcode Fuzzy Hash: b0c467328156de0c5ac949f1a416f5cb14778d2def34c900657a5c1b295a3ac8
                                                            • Instruction Fuzzy Hash: 11915230B0021A9FDB54EB65D9907AEB3F6AFD4204F108569C809EB388EF70DD46CB95

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1221 63887f0-6388814 1222 6388816-6388819 1221->1222 1223 638883a-638883d 1222->1223 1224 638881b-6388835 1222->1224 1225 6388f1c-6388f1e 1223->1225 1226 6388843-638893b 1223->1226 1224->1223 1228 6388f20 1225->1228 1229 6388f25-6388f28 1225->1229 1244 63889be-63889c5 1226->1244 1245 6388941-6388989 1226->1245 1228->1229 1229->1222 1230 6388f2e-6388f3b 1229->1230 1246 6388a49-6388a52 1244->1246 1247 63889cb-6388a3b 1244->1247 1266 638898e call 63890a8 1245->1266 1267 638898e call 638909a 1245->1267 1246->1230 1264 6388a3d 1247->1264 1265 6388a46 1247->1265 1258 6388994-63889b0 1262 63889bb 1258->1262 1263 63889b2 1258->1263 1262->1244 1263->1262 1264->1265 1265->1246 1266->1258 1267->1258
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fcq$XPcq$\Ocq
                                                            • API String ID: 0-3575482020
                                                            • Opcode ID: 5ce280cbf247e918767da2b9d5d544ef3c56f528fe7d74886efccbe05c9882e5
                                                            • Instruction ID: ca136cbc2c5bdefaea8882ee22b85cc3d81583fea07e97aeec7f861a0e2e0cf3
                                                            • Opcode Fuzzy Hash: 5ce280cbf247e918767da2b9d5d544ef3c56f528fe7d74886efccbe05c9882e5
                                                            • Instruction Fuzzy Hash: 5B615E30E002099FEB54EFB9C8547AEBAF6FB88300F208429D106AB395DB758D45CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2196 638d1c0-638d1f5 2197 638d1f7-638d1fa 2196->2197 2198 638d1fc-638d21b 2197->2198 2199 638d220-638d223 2197->2199 2198->2199 2200 638d229-638d23e 2199->2200 2201 638dae3-638dae5 2199->2201 2208 638d240-638d246 2200->2208 2209 638d256-638d26c 2200->2209 2203 638daec-638daef 2201->2203 2204 638dae7 2201->2204 2203->2197 2206 638daf5-638daff 2203->2206 2204->2203 2210 638d248 2208->2210 2211 638d24a-638d24c 2208->2211 2213 638d277-638d279 2209->2213 2210->2209 2211->2209 2214 638d27b-638d281 2213->2214 2215 638d291-638d302 2213->2215 2216 638d283 2214->2216 2217 638d285-638d287 2214->2217 2226 638d32e-638d34a 2215->2226 2227 638d304-638d327 2215->2227 2216->2215 2217->2215 2232 638d34c-638d36f 2226->2232 2233 638d376-638d391 2226->2233 2227->2226 2232->2233 2238 638d3bc-638d3d7 2233->2238 2239 638d393-638d3b5 2233->2239 2244 638d3d9-638d3fb 2238->2244 2245 638d402-638d40c 2238->2245 2239->2238 2244->2245 2246 638d41c-638d496 2245->2246 2247 638d40e-638d417 2245->2247 2253 638d498-638d4b6 2246->2253 2254 638d4e3-638d4f8 2246->2254 2247->2206 2258 638d4b8-638d4c7 2253->2258 2259 638d4d2-638d4e1 2253->2259 2254->2201 2258->2259 2259->2253 2259->2254
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q
                                                            • API String ID: 0-355816377
                                                            • Opcode ID: a64cb3bd0908b82e71359f618ee6a2bedd8ddc94b3009f121f07e73f96520cea
                                                            • Instruction ID: 1ea11ca9e86d636367b182ab526618558b4c4ef2c947556ae4949dd88ce01848
                                                            • Opcode Fuzzy Hash: a64cb3bd0908b82e71359f618ee6a2bedd8ddc94b3009f121f07e73f96520cea
                                                            • Instruction Fuzzy Hash: A0512030B102069FDB54EB75D9A0BAE73F6AF98244F108469C809DB388EF30DC56CB95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: fcq$XPcq
                                                            • API String ID: 0-936005338
                                                            • Opcode ID: 9f0bb3c2986432fc875031ab0a5b29bb432fe968954a33df78857dbe839cc197
                                                            • Instruction ID: b2b664fa667745e954ca24c11efe362fdf697aa3c16867c002a6043b00b9e7c6
                                                            • Opcode Fuzzy Hash: 9f0bb3c2986432fc875031ab0a5b29bb432fe968954a33df78857dbe839cc197
                                                            • Instruction Fuzzy Hash: 97517F30F102189FDB55EFB9C8547AEBAF7BF88700F20852AD145AB395DA758C05CB91
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNELBASE ref: 063C4CCF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: 1c76217d8f776e9738519f1592e7294da73cb213dd47d92c49cda8ef790a8e08
                                                            • Instruction ID: 3c42b2f8852492e211111f7388c1fd82a5dde9becf46babf7c1055090553e578
                                                            • Opcode Fuzzy Hash: 1c76217d8f776e9738519f1592e7294da73cb213dd47d92c49cda8ef790a8e08
                                                            • Instruction Fuzzy Hash: EF41F131D043959FCB14DFB9D8506AEBFF1AF8A220F1589AEE484E7252DB349844CBD1
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063C7E82
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 2c4a14ab0cd5f0458ea6f5ecfba941668be6a6ce47ee58792f2f2bcefab50927
                                                            • Instruction ID: a24940c67ddc8f1c6e899456008db90b7d1f977aa6ecd8c0e722b300053a4bcd
                                                            • Opcode Fuzzy Hash: 2c4a14ab0cd5f0458ea6f5ecfba941668be6a6ce47ee58792f2f2bcefab50927
                                                            • Instruction Fuzzy Hash: FE51DDB1D103599FDB14CFA9C884ADEBBB5BF48310F24812EE819AB210D770A985CF91
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063C7E82
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: a80ac2e50c61c954b9cb52ddf25002ecae109dda8081ebe8e33923cf60d1247e
                                                            • Instruction ID: 5f076d3f3e2b209a32dc028d87db640696798399a4a30dd19a0eb5c2f61d9228
                                                            • Opcode Fuzzy Hash: a80ac2e50c61c954b9cb52ddf25002ecae109dda8081ebe8e33923cf60d1247e
                                                            • Instruction Fuzzy Hash: 6841BEB1D10359DFDB14CFA9C884ADEBBB5BF48310F24812EE819AB250D7719985CF91
                                                            APIs
                                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 063C8F49
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: CallProcWindow
                                                            • String ID:
                                                            • API String ID: 2714655100-0
                                                            • Opcode ID: a7d00e2e84869b61b896b04a3a30d94c458d6a7a7007ab0ef20e28d9d4aeb737
                                                            • Instruction ID: 5aad8d317cdd00fc5f9c5b7d326e53d045065c5a06db12f4222c7b99c08c0cf9
                                                            • Opcode Fuzzy Hash: a7d00e2e84869b61b896b04a3a30d94c458d6a7a7007ab0ef20e28d9d4aeb737
                                                            • Instruction Fuzzy Hash: AC4129B59003058FDB54CF59C488AAABFF5FB88324F24885DE519A7321C774A941CFA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: 0aca26df475d125283fb255e78e8a2fafbf5d8850e1d67a17075eac2857ab97f
                                                            • Instruction ID: 79fbdc0fc8ff1dcbaa02dd3c54474cdc6f423c8a2476584898ba59cf00c34f11
                                                            • Opcode Fuzzy Hash: 0aca26df475d125283fb255e78e8a2fafbf5d8850e1d67a17075eac2857ab97f
                                                            • Instruction Fuzzy Hash: 0B3132B0D01248EFDB14CFA9C984BDEBBF5EF49314F20805AE405BB2A1D7B45949CBA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Clipboard
                                                            • String ID:
                                                            • API String ID: 220874293-0
                                                            • Opcode ID: 35058c06e0666b2b42c1951678e06df383152ecec6f3fe1ec6d2f761caf605ed
                                                            • Instruction ID: df6d346fa17c61a3fe1c542922222c58450ae11012eeb2cbce4821f3516e9972
                                                            • Opcode Fuzzy Hash: 35058c06e0666b2b42c1951678e06df383152ecec6f3fe1ec6d2f761caf605ed
                                                            • Instruction Fuzzy Hash: 5B31F1B0D01248EFDB14CF99C984BCEBBF5EF48314F248059E404BB294D7B46945CBA5
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 0149CBC2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: CurrentThread
                                                            • String ID:
                                                            • API String ID: 2882836952-0
                                                            • Opcode ID: 29e7f793753d624fa63dd481abc1c2788de03ab29c7aad7ac5bdd9332e31c001
                                                            • Instruction ID: df6d4baaf3824ac2d66a212b267e4a696cdd477af65f9715a141fd572e19573c
                                                            • Opcode Fuzzy Hash: 29e7f793753d624fa63dd481abc1c2788de03ab29c7aad7ac5bdd9332e31c001
                                                            • Instruction Fuzzy Hash: 1D3132B590024A8FCB10DFA9D884B9EFFF4FB59314F14856AD419AB321C374A948CFA5
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0149AFD7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: bfee0f71e30d43f47b933cb9d01703e68e625deba177fe720059065fe0aa39c0
                                                            • Instruction ID: 0d97e86794ab32ea6c105b8ed408bf5fa1eb5e76b8068e07bf93bebfb2ca4fdc
                                                            • Opcode Fuzzy Hash: bfee0f71e30d43f47b933cb9d01703e68e625deba177fe720059065fe0aa39c0
                                                            • Instruction Fuzzy Hash: 4521E4B59002589FDB10CF9AD984ADEBFF4EB48320F24801AE918A3350C374A940CFA5
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0149AFD7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: de2d9c5aaa918b76daa805a3fe49a9609940af80fee46862960915998c8203cd
                                                            • Instruction ID: 0d268719be6fa1baccbdd7ca4df96362dfd19c61b78ccf343e425c7e7e1b4a54
                                                            • Opcode Fuzzy Hash: de2d9c5aaa918b76daa805a3fe49a9609940af80fee46862960915998c8203cd
                                                            • Instruction Fuzzy Hash: 0B21C4B59002589FDB10CF9AD584ADEBFF4EB48310F24841AE954A7350D374A944DFA5
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 063CB6AB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: daa8041bdec57d480b17108a9a9cab63bc3cfc1d651a76e475fc57553bc24e63
                                                            • Instruction ID: b67b511d7230e7492955386bc906ce717b6bde41ca2affeb9d74d8f47e5df9a5
                                                            • Opcode Fuzzy Hash: daa8041bdec57d480b17108a9a9cab63bc3cfc1d651a76e475fc57553bc24e63
                                                            • Instruction Fuzzy Hash: 982137B19002499FCB14DF99C845BEEFBF4EF89320F10842EE459A7250C775A994CFA5
                                                            APIs
                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 0149CCA1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: EnumThreadWindows
                                                            • String ID:
                                                            • API String ID: 2941952884-0
                                                            • Opcode ID: 1a79e50963dd1bf9364c93af8e59c93facc9be6be33d9b33dcfa33811f7e33d5
                                                            • Instruction ID: dc0c1b949d82028e01d02cb28591c0c7d25459b482ed08a30090c5639bdb89ce
                                                            • Opcode Fuzzy Hash: 1a79e50963dd1bf9364c93af8e59c93facc9be6be33d9b33dcfa33811f7e33d5
                                                            • Instruction Fuzzy Hash: 362138B1D002598FDB14CF9AC885BEEFBF4EB98320F14842AD458A7350D778A945CFA5
                                                            APIs
                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 0149CCA1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: EnumThreadWindows
                                                            • String ID:
                                                            • API String ID: 2941952884-0
                                                            • Opcode ID: 1b8d1265b9f2eff5ed2498296632bee37482c4180ef2b255e31614c9f760df4a
                                                            • Instruction ID: 957b000dc86eb7c67ce351a6f2e92346a97494955e3d790b298e71c6ac55af0d
                                                            • Opcode Fuzzy Hash: 1b8d1265b9f2eff5ed2498296632bee37482c4180ef2b255e31614c9f760df4a
                                                            • Instruction Fuzzy Hash: 642108B1D002598FDB14CF9AC845BEEFBF5EB88320F14842AD458A7350D774A945CFA5
                                                            APIs
                                                            • MessageBoxW.USER32(?,00000000,00000000,?), ref: 0149D03D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Message
                                                            • String ID:
                                                            • API String ID: 2030045667-0
                                                            • Opcode ID: 7961f33149fc50c163929693dc270384d5c51a7baf515e5c5daf6ce25f3135c9
                                                            • Instruction ID: 7d68f85c6bf2ab954c17f01996652c6a6610e464a75eeaacca5848083eb2161f
                                                            • Opcode Fuzzy Hash: 7961f33149fc50c163929693dc270384d5c51a7baf515e5c5daf6ce25f3135c9
                                                            • Instruction Fuzzy Hash: 8121FEB6C003499FDB14CF9AD884ADEFBB4FB88354F10842AE918A7210C375A945CFA4
                                                            APIs
                                                            • MessageBoxW.USER32(?,00000000,00000000,?), ref: 0149D03D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Message
                                                            • String ID:
                                                            • API String ID: 2030045667-0
                                                            • Opcode ID: 9364d700a7e059d98993de1f77d3715de8d6e79e98ffe87e949e323d6d232bcb
                                                            • Instruction ID: f1c1701ee3b56e875d2127be283c071690b95f4097d23fc9e3f7a0fa82147a2d
                                                            • Opcode Fuzzy Hash: 9364d700a7e059d98993de1f77d3715de8d6e79e98ffe87e949e323d6d232bcb
                                                            • Instruction Fuzzy Hash: 3221FBB6C003499FDB14CF9AD884ADEFBB4BB88354F10842AE918A7210C375A945CBA4
                                                            APIs
                                                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 063CB6AB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: HookWindows
                                                            • String ID:
                                                            • API String ID: 2559412058-0
                                                            • Opcode ID: 3209fadb5b9ca417c603866bbeaf6eaa5f2e76fc9717235b4480a2ad8e74ed98
                                                            • Instruction ID: 655921e616b233f6e67975442880fc1bdd0cc2ba016bf9f5e3582389f14dbfdb
                                                            • Opcode Fuzzy Hash: 3209fadb5b9ca417c603866bbeaf6eaa5f2e76fc9717235b4480a2ad8e74ed98
                                                            • Instruction Fuzzy Hash: 8E2122B1D002198FCB14CF9AC845BEEFBF5EB88320F10842AE459A7250C774A944CFA5
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNELBASE ref: 063C4CCF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID:
                                                            • API String ID: 1890195054-0
                                                            • Opcode ID: e5c592ea872827c119e744431f646e3d16f2265ebee175d083622b648527692a
                                                            • Instruction ID: 30c57d422d24ae6f349e2e4107804773a4cfd0e5db787d517da4e21c7ea1ed97
                                                            • Opcode Fuzzy Hash: e5c592ea872827c119e744431f646e3d16f2265ebee175d083622b648527692a
                                                            • Instruction Fuzzy Hash: E411EFB1C006699BCB10DF9AC545BDEFBF4AB48320F14816AE818A7251D778A944CFA5
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 063C72A6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 3feb2a5fa0be5d39461787e5b6a489b5693976780edbbfee4318c5529b94c8d6
                                                            • Instruction ID: efc6a3cb47f21a081d662a8788d373189d91ddc5414111f15880941928338b83
                                                            • Opcode Fuzzy Hash: 3feb2a5fa0be5d39461787e5b6a489b5693976780edbbfee4318c5529b94c8d6
                                                            • Instruction Fuzzy Hash: A211F3B6D002498FCB10CF9AC444ADEFBF4EB89224F14852EE859A7210C375A945CFA5
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0149AFD7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: e3b0c7d26d34bef9f4becf9abf6bda3c4a69639eecf85490be3f648db3ea1032
                                                            • Instruction ID: 14b43420afc1fff49b9300c8007401d3f17db89c92c8fbe526c0a196cdf49a60
                                                            • Opcode Fuzzy Hash: e3b0c7d26d34bef9f4becf9abf6bda3c4a69639eecf85490be3f648db3ea1032
                                                            • Instruction Fuzzy Hash: 1B1157B5904208DFDF01CFA9D844AEEBFF4EF49310F24805AE959A7261C338A954DF61
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 063C72A6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 208c884790426d376da0139c700bcbf918df5c52ba4eadc4a31c534a0089df4c
                                                            • Instruction ID: e5b72c0b8921b718e9472a1a1e4434db5c952139730ca8c368a4d64712c01c18
                                                            • Opcode Fuzzy Hash: 208c884790426d376da0139c700bcbf918df5c52ba4eadc4a31c534a0089df4c
                                                            • Instruction Fuzzy Hash: 2611E0B6C002498FDB14DF9AC844ADEFBF4EB89324F10852EE859B7210D375A945CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 0149BDD5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 60853ef3bb3c502de50d9c8648916a2e6a7dfbb1be75022e35cfb9896dec9788
                                                            • Instruction ID: c88588d18e48bca963aee31524604728d23716c51a362bf21a074ac710c93ffc
                                                            • Opcode Fuzzy Hash: 60853ef3bb3c502de50d9c8648916a2e6a7dfbb1be75022e35cfb9896dec9788
                                                            • Instruction Fuzzy Hash: 2B1103B19002488FDB20DF9AD449BDEBFF4EB48324F20855AD558A7210C374A945CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,063C919D), ref: 063C9227
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 0d1b249ddf35e8effc62c41a85ba993d03b35f983a90015b7ac2ced797f33892
                                                            • Instruction ID: ee5c7aaec6d39219b95e8ab836413b22822fba434a15d94c1f5b22fdb36656f4
                                                            • Opcode Fuzzy Hash: 0d1b249ddf35e8effc62c41a85ba993d03b35f983a90015b7ac2ced797f33892
                                                            • Instruction Fuzzy Hash: 391103B5800249CFCB60DF9AD449BDEBFF8EB48324F20845AE559A7250C374A944CFA5
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,063C919D), ref: 063C9227
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120298723.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_63c0000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: b108ee08b8612a659db5b16bb54b2943ca268b6e8a3191675b0297cfd47e7751
                                                            • Instruction ID: 5edc316a5889a4e9b234db1aa19e33743ebf0dd865328827887f71ed64ea71a6
                                                            • Opcode Fuzzy Hash: b108ee08b8612a659db5b16bb54b2943ca268b6e8a3191675b0297cfd47e7751
                                                            • Instruction Fuzzy Hash: CC11F2B58002498FCB20DF9AD445BDEBBF8EB49324F20845AE598A7251C375A944CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 0149BDD5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4115218390.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_1490000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 8e7f5352e3caad3f6a9bbb502b797eb752e93688ec2d978da4e52040baa10baa
                                                            • Instruction ID: 76924a3f5764b67de7af95a29a60108e9e46e5c2d56f2051c85a05c2dec07ef0
                                                            • Opcode Fuzzy Hash: 8e7f5352e3caad3f6a9bbb502b797eb752e93688ec2d978da4e52040baa10baa
                                                            • Instruction Fuzzy Hash: C01115B58002488FDB20DF9AD445BDEBFF4EB48324F20845AD558A7710C374A944CFA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH^q
                                                            • API String ID: 0-2549759414
                                                            • Opcode ID: 05f379bb2b22cab6be1c1b1612e989976f742e21fe001da022633f1cf1a323aa
                                                            • Instruction ID: 100d541a6979626ee4b7c9f4251452cc0a7ec326c1fddd4c6192d50d877d5c6a
                                                            • Opcode Fuzzy Hash: 05f379bb2b22cab6be1c1b1612e989976f742e21fe001da022633f1cf1a323aa
                                                            • Instruction Fuzzy Hash: 6B41F331B003018FDB96AB74D4546AF7BE6AF95220F108469E402DB384EF35DC4ACBE2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PH^q
                                                            • API String ID: 0-2549759414
                                                            • Opcode ID: 1b44e254b047cbc4e4e72f4b65c7431634fc6acb078d7b1f4f9d3d08fb727dc4
                                                            • Instruction ID: 593e289eb65d525293c23aea89133a15c382bdf3a868187db0bd7ccc37b8c991
                                                            • Opcode Fuzzy Hash: 1b44e254b047cbc4e4e72f4b65c7431634fc6acb078d7b1f4f9d3d08fb727dc4
                                                            • Instruction Fuzzy Hash: DC31D030B003058FDB99AB74D5546AF7AE6AF94210F208429E406DB384EF35DC4ACBD1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q
                                                            • API String ID: 0-388095546
                                                            • Opcode ID: 21c3dc21d9349c907a54139c1f99cf71eb4f6be63c31e690ed43731f3a0e53eb
                                                            • Instruction ID: 0b9cb3dec4d2aeb00b8ce650be44d919383c8a24160c91ddb2824efdafaf0adc
                                                            • Opcode Fuzzy Hash: 21c3dc21d9349c907a54139c1f99cf71eb4f6be63c31e690ed43731f3a0e53eb
                                                            • Instruction Fuzzy Hash: 54F03A35A00318DFDF64AB50ED506ECB778FB80215F589562D801E7650C3799E9BCBE0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \Ocq
                                                            • API String ID: 0-2995510325
                                                            • Opcode ID: 7f7fa49f3893b13f7cf747bfcf1b50fbb31d78350a8d2a79cd7aaf011aff9af2
                                                            • Instruction ID: ad54819e2842b29d5654597f1eb121b5c890510584fda2eb678a7e60ec0a6e93
                                                            • Opcode Fuzzy Hash: 7f7fa49f3893b13f7cf747bfcf1b50fbb31d78350a8d2a79cd7aaf011aff9af2
                                                            • Instruction Fuzzy Hash: CAF0DA30A60219DFDB14DF94E9597AEBBB2BF84700F604519E102A7294CB741D05CFC0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5453509c5a0e5c798d39af83ad585e891a0a1f34d8a71dd5fb92ed5da8dc0c58
                                                            • Instruction ID: de773ed9b2d00458d0d7d09c1880013366c8b9e2887e7d1ec17390509e8a7c43
                                                            • Opcode Fuzzy Hash: 5453509c5a0e5c798d39af83ad585e891a0a1f34d8a71dd5fb92ed5da8dc0c58
                                                            • Instruction Fuzzy Hash: 2A61B171F001114FCF54AA7DC8846AFBAD7AFD4610B25443AD80EDB364DE65ED0287D6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d68d4064dc18ce9a1bf562af976c669c131532a087b114c08addbe1659e8aa5
                                                            • Instruction ID: 7d014e0b65d2070dcbf3185e763ca267af57efd514d5c432c26ddb83f96dda89
                                                            • Opcode Fuzzy Hash: 6d68d4064dc18ce9a1bf562af976c669c131532a087b114c08addbe1659e8aa5
                                                            • Instruction Fuzzy Hash: 88814D31B102099FDF55EBA8D4506AEB7B3AF99304F208425D40ADB395EA34EC86CB91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f58c0aafcad60998dc7ea1e1faf369fbd19887adcf7f36e157cdbc5f4b114206
                                                            • Instruction ID: e96899e665c65279f532e8e4072e066ea473edab6df7dd3c02cf2a573096da78
                                                            • Opcode Fuzzy Hash: f58c0aafcad60998dc7ea1e1faf369fbd19887adcf7f36e157cdbc5f4b114206
                                                            • Instruction Fuzzy Hash: D1912C30E1021A8FDF60DF68C890BDDBBB1FF85314F208599D449AB255DB70AE85CB91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06241b127121fc7b54acd6a56ea48e67178e407af09d2c8f3fc79a630e586d49
                                                            • Instruction ID: bcbfc47d9316318053162eef77d84443fc14fe834504b000ac6809212b8e363a
                                                            • Opcode Fuzzy Hash: 06241b127121fc7b54acd6a56ea48e67178e407af09d2c8f3fc79a630e586d49
                                                            • Instruction Fuzzy Hash: 80817E71A002058FDB54DF69D884BDDBBF6FF88310F14C169E909AB395DB719948CB90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 652dd31bc9ef066b9a5153a0f33cb17ccb563fcb1adcab78897a2b117efc8325
                                                            • Instruction ID: 2edef23b7111c6bea184c93dd0cb178866da42c744fed90883c6f80b8fc031a7
                                                            • Opcode Fuzzy Hash: 652dd31bc9ef066b9a5153a0f33cb17ccb563fcb1adcab78897a2b117efc8325
                                                            • Instruction Fuzzy Hash: D0913C30E1021A8FDF60DF68C880BDDB7B2FF89304F208599D549AB255DB70AE85CB91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 27fff3355917de140273b5e599298d0d98191b54d4fcb5861b58896bdefb82c0
                                                            • Instruction ID: 489775173f2e87a6a882540681564e3eb216918d261191cc1e4416f5bb3532b8
                                                            • Opcode Fuzzy Hash: 27fff3355917de140273b5e599298d0d98191b54d4fcb5861b58896bdefb82c0
                                                            • Instruction Fuzzy Hash: 1641A275F103068FDF68AAA8D8907AFB765EB85224F204826D419D7380D735DC8ECBD2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a17ad6840d7e132e864a7f2b589ee9f6ff14ca6251725177377ebf2fe0010fb0
                                                            • Instruction ID: d540b5605b237c27b6478bdd67d9e306368af89c02e7c4488a7da536755e6965
                                                            • Opcode Fuzzy Hash: a17ad6840d7e132e864a7f2b589ee9f6ff14ca6251725177377ebf2fe0010fb0
                                                            • Instruction Fuzzy Hash: C441D474E103058FDB69AB68C8907AFBB76EB86214F10482AC459D7381C735DC4EC7C2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ef1c766965efae14ec7467d096b8ecf2e0d7762d38d3dedc4de5afd5d9ca430c
                                                            • Instruction ID: 6f2ab5f22e654562a66362a8c179fa08db044e6a2978f9188e1fd303ed9a2d13
                                                            • Opcode Fuzzy Hash: ef1c766965efae14ec7467d096b8ecf2e0d7762d38d3dedc4de5afd5d9ca430c
                                                            • Instruction Fuzzy Hash: F9411671E007098FDB60DEADD884BBFFBB6EB84310F10492AD216D6694D631A949CBD0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 82b8bba928bbf3628aa396786d9bc5ddc5534722add9c26fb6f1be8a177cda66
                                                            • Instruction ID: e2f2c2bb4e03a0988a6806296bad29a2adc8c1bfe3cacb18c7997c44ca9cd4ac
                                                            • Opcode Fuzzy Hash: 82b8bba928bbf3628aa396786d9bc5ddc5534722add9c26fb6f1be8a177cda66
                                                            • Instruction Fuzzy Hash: 4D315D35E1030A9FCB99DF64D8546DEB7B6EF89310F108529E816E7750DB70AC4ACB90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9f5ef29a04906aca206baee30249f0577b65aff41b4cfb856d43e65b85760051
                                                            • Instruction ID: d2c4ca0b29972f543e2fa7304d260133730444c1bdb7018d9325cc53dc603aab
                                                            • Opcode Fuzzy Hash: 9f5ef29a04906aca206baee30249f0577b65aff41b4cfb856d43e65b85760051
                                                            • Instruction Fuzzy Hash: 02314D34E1070A9FCB59DF65D85469EB7B2EF89310F108529E816E7750DB70AC4ACB90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0ffd5954332356a95bacf81cc37a2ddf4c01efec3721c87e7da4a1599212895
                                                            • Instruction ID: b489ef9867b516466f65ab6be41f7d841a9a9efadf6568024080d1d013c47874
                                                            • Opcode Fuzzy Hash: a0ffd5954332356a95bacf81cc37a2ddf4c01efec3721c87e7da4a1599212895
                                                            • Instruction Fuzzy Hash: 42218D79E002059FDB50DFB8E981AEEBBF6EB58210F148025E904E7344E730D941CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc5a4ce94a04cdd7d62f861457ecef72d552e0fe6dca344c2ec34db8d934e680
                                                            • Instruction ID: f0a5b1eeda78dbda95054b88f77c7fd9868940649e9552edec096d5c9fd7636f
                                                            • Opcode Fuzzy Hash: dc5a4ce94a04cdd7d62f861457ecef72d552e0fe6dca344c2ec34db8d934e680
                                                            • Instruction Fuzzy Hash: 5B217C75E102159FEB50EF79D980AEEBBF6FB58610F248025E915E7384E730D901CB91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4114987328.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_12ad000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 49ca2a1f03571c1544c22144054d0d482f49ca0011b5b69b858592fd9c093824
                                                            • Instruction ID: 073eff8aeab724f2c87d2de330eb1dba2ac99ccc021d5c4f2e711f1dde8335d5
                                                            • Opcode Fuzzy Hash: 49ca2a1f03571c1544c22144054d0d482f49ca0011b5b69b858592fd9c093824
                                                            • Instruction Fuzzy Hash: 0A2187B1114208DFCB01DF58D9C4B2AFFA5FB88324F60C96DE9090BA42C37AD406CEA1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4114987328.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_12ad000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 968f098096293b230eafd5c431b585d70f0b728d10a364d4647df20f209061b6
                                                            • Instruction ID: 0b25e7463cb4c6f7fb361bb2bf27554197f91d3105afa258995dd0709c30aa37
                                                            • Opcode Fuzzy Hash: 968f098096293b230eafd5c431b585d70f0b728d10a364d4647df20f209061b6
                                                            • Instruction Fuzzy Hash: B0217970214308DFDB05DF58C9C0B26BBA1FB84314F60C5ADE9494B752C37AE446CB61
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4114987328.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_12ad000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dfe56e46088824389a555efe99d3e0de84e9bf49d2b78cc0918e88de515af2ca
                                                            • Instruction ID: 829f4c7c70fdf29e7614ab7eb646f5a8e846e931ded20b898ceec3b32481492d
                                                            • Opcode Fuzzy Hash: dfe56e46088824389a555efe99d3e0de84e9bf49d2b78cc0918e88de515af2ca
                                                            • Instruction Fuzzy Hash: 86219870110208DFDB01DF58E5C0B26BFA1FB88318F60C5ADE9494B756C376D846CB61
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6aba73d1d3c3eb9ef46cef77a273325009b377bb048bff84121f3f42d7a8cac4
                                                            • Instruction ID: 03649e86f5eb472829e83c2e8aa55f86f1c604d54ec94ecf63547f970463edcf
                                                            • Opcode Fuzzy Hash: 6aba73d1d3c3eb9ef46cef77a273325009b377bb048bff84121f3f42d7a8cac4
                                                            • Instruction Fuzzy Hash: AF21AF31B102199FDF94EA69E9506DEF7B6EF84314F148426D809EB384DB31AC46CBC5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 94982c2af92c352a58a846979d3483aa535c388caf865cf23e9414fa741f555f
                                                            • Instruction ID: ef3a684b7ad5951cff9769526c8b91205e73f0746ecda165a47d331f9e35a54c
                                                            • Opcode Fuzzy Hash: 94982c2af92c352a58a846979d3483aa535c388caf865cf23e9414fa741f555f
                                                            • Instruction Fuzzy Hash: 5111B171E002189FCF54EB68D8415DEBBB5EFC9310F208969D009E7214DA31DD49CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f617edb9cd690e5607f0b3bffd592801d64ca00fc801d96e319dfd65e7e9746c
                                                            • Instruction ID: 076361d3c7d72a75d93ca8f20ead1c5663ef895d2b786319f985e07db4a8ef1b
                                                            • Opcode Fuzzy Hash: f617edb9cd690e5607f0b3bffd592801d64ca00fc801d96e319dfd65e7e9746c
                                                            • Instruction Fuzzy Hash: B5118171A047099FCB21DFA9DC809AFFFB6BB85210B104929D15597651C731A949CBD0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3cb1cf790695f24462cda808065cbd3d19befc36a2f58aa98c50d3137780c96d
                                                            • Instruction ID: 7a24617ea74b29cc5b6c63c9238f86d0b1576d41fc591067a240898ee3b72a4a
                                                            • Opcode Fuzzy Hash: 3cb1cf790695f24462cda808065cbd3d19befc36a2f58aa98c50d3137780c96d
                                                            • Instruction Fuzzy Hash: 92019231B102111FDB62A57C9851BAFA7EBCBC9710F24883AF00ACB741D969CD0683A1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 01f2846e6ef8c696878e32d6d68677fa79b63c46e343feea2a69d24d25051b82
                                                            • Instruction ID: 89f7661344d0a6319aa597a65671b7de9938e9aa64145a94e6f3b583da350b93
                                                            • Opcode Fuzzy Hash: 01f2846e6ef8c696878e32d6d68677fa79b63c46e343feea2a69d24d25051b82
                                                            • Instruction Fuzzy Hash: D0117C32F102285FDB64A668C8146AE73BBABC8710F20807AD40AE7354DE249C02CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e6e42250e55b9e0d1bbacda5022bee7731cf63cc5881585937cb793075a8071
                                                            • Instruction ID: 6f5a010763dea41bf1cadb0e959ebd6e63cde92271a9a0ae5f3fbcd531fd08ef
                                                            • Opcode Fuzzy Hash: 8e6e42250e55b9e0d1bbacda5022bee7731cf63cc5881585937cb793075a8071
                                                            • Instruction Fuzzy Hash: ED01B136F142256FDBA4A5689C156EF67BF9BC8200F248136D009E7744DE608846C7E2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48ef3d1b21fdeaa9cae6b7c87c1db3fd8c45bd609ea597d0d0c6a127c2e754c4
                                                            • Instruction ID: 985806f21eacc2a6d76161eb7aea5c141d90ba24e1d16f8a6f421b0742a2efdc
                                                            • Opcode Fuzzy Hash: 48ef3d1b21fdeaa9cae6b7c87c1db3fd8c45bd609ea597d0d0c6a127c2e754c4
                                                            • Instruction Fuzzy Hash: 9121E3B5D01259AFCB10DF9AD884ADEFFB4FB49310F20812AE558A7200C374AA54CFE5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fe6efeb40e58ad21427a92e87710b658d14267104586563abdd3756162c3c059
                                                            • Instruction ID: e34f494d9d2fb5a64d00cc092cc5674d78d0931d313d770fca38c1b0dcd9cba5
                                                            • Opcode Fuzzy Hash: fe6efeb40e58ad21427a92e87710b658d14267104586563abdd3756162c3c059
                                                            • Instruction Fuzzy Hash: 6501D835B101104FCBA2A67CE8657AB77E5DB8A324F108839E40DC7364DA34DC49C3D1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4114987328.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_12ad000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                                            • Instruction ID: 740d574e8e8da271da533cf9dea3ec439efee8382ac31ae99f457459848db8e8
                                                            • Opcode Fuzzy Hash: 72d23902bf60047e6ac5528eaef86f122a9a091f4bdaa5726a35430d0a81cb07
                                                            • Instruction Fuzzy Hash: 30119076504284CFDB12CF14D5C4B1ABF61FB84324F24C6AAD9494BA56C33AD40ACF51
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4114987328.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_12ad000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: 8bf92278ca0501aedd4139dbecee67de19739fee93fe4f4a5884081d4cdc709c
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: 7811D075504244CFDB06CF58C9C4B15BF61FB84314F24C6A9DD494B652C33AE44ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4114987328.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_12ad000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction ID: fd9038c6fba5d8a39f3da8d71faac91450c3d0296fc6cba0cc12a4a5efc181fe
                                                            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                            • Instruction Fuzzy Hash: E211BB75504284CFDB02CF58E5C4B15BFB2FB84318F24C6AAD9494B656C33AD44ACF62
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 98e115934236f43b52c0474d4466d744f7ead9f18f466d1420d5be23bd8d80fb
                                                            • Instruction ID: 1d5976d53bcd32172fae0a2797583cc0d21e71e2007af09485ae1694bfef05dd
                                                            • Opcode Fuzzy Hash: 98e115934236f43b52c0474d4466d744f7ead9f18f466d1420d5be23bd8d80fb
                                                            • Instruction Fuzzy Hash: 9311D3B5D012599FCB00DF9AD884ACEFBB4FB48310F10812AE518A7200C374A944CFE5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d21d92e6c24eae79cc9d5a4e1f7d1da06e12df0f8f4cdad0ebf345efce242814
                                                            • Instruction ID: d26cba10ec4cab4d4a05ae6d8830af175e1a632455b8e0b7a3a415452e42df6c
                                                            • Opcode Fuzzy Hash: d21d92e6c24eae79cc9d5a4e1f7d1da06e12df0f8f4cdad0ebf345efce242814
                                                            • Instruction Fuzzy Hash: 0801A931B101141FDB65A66DA450B6FA3EBCBC9710F208839E00ECB340DE69DC0683A5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1585c09e3d20db1e98c2f766f069f042f7a342d4ecc8ba3e68c3efad74261142
                                                            • Instruction ID: 317ad22e7a5f37f70e5f14c33b05c96082845c05ed6ee2aabf0c43507756afbb
                                                            • Opcode Fuzzy Hash: 1585c09e3d20db1e98c2f766f069f042f7a342d4ecc8ba3e68c3efad74261142
                                                            • Instruction Fuzzy Hash: 74016D5240E3D41EDB436A389C751E63F74DE53114B1A44DBD4D5CF1A3E108CA8EE3A6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0ecaca2916e43b70cc33744d16d69a7c89586919ca6e744da62518f8b06f748
                                                            • Instruction ID: 4fa5a85c0401b86c6ed0e0082642eebc507a58e371382893252486a0329d2ce7
                                                            • Opcode Fuzzy Hash: a0ecaca2916e43b70cc33744d16d69a7c89586919ca6e744da62518f8b06f748
                                                            • Instruction Fuzzy Hash: 99016D30B102145FDB61A67DE855B6AB3D9EB8A724F108839E40EC7354DA71DC4683C5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 20e5a1db234f8e80e321ba2ef1df4da5b82e92b32f49136bfe322854e67d1fe8
                                                            • Instruction ID: dac653fd220f655a602d154efab31d8bd2bf1945e13960ac94c6cdf8d1e195b1
                                                            • Opcode Fuzzy Hash: 20e5a1db234f8e80e321ba2ef1df4da5b82e92b32f49136bfe322854e67d1fe8
                                                            • Instruction Fuzzy Hash: 12F0A732E103688FEF709569E4447CABBE9E745320F11483AE90AD7240D6309809C7C1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 195e45b8636c3f4bacc314e1e15b6fec82fa6c7e2ae67eeb25206a7346fd5584
                                                            • Instruction ID: c50d666d22f17d58779c6ec4258989dbcb36e4203a5cfdab881c2b8f54959a1d
                                                            • Opcode Fuzzy Hash: 195e45b8636c3f4bacc314e1e15b6fec82fa6c7e2ae67eeb25206a7346fd5584
                                                            • Instruction Fuzzy Hash: 62F09B319063496FDF60EE709D416EA7FBCDB02614F2144D7E484CB142E535CA89D7E1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 217bf573ed346612cb0fc09a2c64cd65f2234e331003aad94ccc0474bf275227
                                                            • Instruction ID: 0878233d228d1f95cb1fd9e9f37715082ccfb62050e0427ee214cdf580731e94
                                                            • Opcode Fuzzy Hash: 217bf573ed346612cb0fc09a2c64cd65f2234e331003aad94ccc0474bf275227
                                                            • Instruction Fuzzy Hash: 81E01271E1030DAFDF50EEB4C94579E77ADD701214F2088A6D449D7201E576DA45DBC0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                            • API String ID: 0-2222239885
                                                            • Opcode ID: 9d206e67c93217d941ebfe3fcd58723b4f6393c3f601d37b8eca04f41a6eed1a
                                                            • Instruction ID: c464c3d7b2a055112b353b85fcac8dbf70274b4b293526dd2307f382dad893c7
                                                            • Opcode Fuzzy Hash: 9d206e67c93217d941ebfe3fcd58723b4f6393c3f601d37b8eca04f41a6eed1a
                                                            • Instruction Fuzzy Hash: 2212FC30E0031A8FDB64EF65D954A9DB7B6BF84304F208569D40AAB365DB319D85CF81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                            • API String ID: 0-3823777903
                                                            • Opcode ID: 4e4cf8bc625208e2553f4b857ca50eab851efe9f86fffe66f2af2684eab02c7a
                                                            • Instruction ID: 262a8ec9e4c035ad5bd97e7f27b231f98cf56ff79b9b1f3572795c7a66700985
                                                            • Opcode Fuzzy Hash: 4e4cf8bc625208e2553f4b857ca50eab851efe9f86fffe66f2af2684eab02c7a
                                                            • Instruction Fuzzy Hash: 2B916D30E103099FEB69EB69D554BAEBBB6BF84300F108429E4029B394DB759C49CBD0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                            • API String ID: 0-390881366
                                                            • Opcode ID: 52fb834a49ecef7ad7c4632be4244e2cf03a4dd5c94ccd51e9c7ccd2e68104ad
                                                            • Instruction ID: 97757db34d1b12d779dad0ffca1ee6598aa2317318e5d1f2d73fc2ec218c37fd
                                                            • Opcode Fuzzy Hash: 52fb834a49ecef7ad7c4632be4244e2cf03a4dd5c94ccd51e9c7ccd2e68104ad
                                                            • Instruction Fuzzy Hash: F9F14030B01309CFDB54EF65D594AAEBBB6BF94300F248569D4169B368CB35DC86CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q
                                                            • API String ID: 0-2125118731
                                                            • Opcode ID: 12fc3c39aa9d67e4f21ea8fd4c4fb45893368a4c9e8cd5b2934497d1bcefb35e
                                                            • Instruction ID: 48d5e9c630a9e0a519a04e3ca42f8bd63a9b4ea41236de219154be9c49c2b8fb
                                                            • Opcode Fuzzy Hash: 12fc3c39aa9d67e4f21ea8fd4c4fb45893368a4c9e8cd5b2934497d1bcefb35e
                                                            • Instruction Fuzzy Hash: 0FB13930E102098FDB64EB79D5946AEB7B6BF94300F249829D40ADB364DB75DC86CB90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LR^q$LR^q$$^q$$^q
                                                            • API String ID: 0-2454687669
                                                            • Opcode ID: 778b91fd5d95a25df3087a1ee3119da88c02ec3c02be7ef36f40cc0de61f60d5
                                                            • Instruction ID: 11a626e34750a34b2d4b02bd1b638b18cae6b7f71db8c947620bb7c90592064a
                                                            • Opcode Fuzzy Hash: 778b91fd5d95a25df3087a1ee3119da88c02ec3c02be7ef36f40cc0de61f60d5
                                                            • Instruction Fuzzy Hash: B851C231B002058FDB58EB38D990AAAB7E6FF88304F1485A9E405DB365DB31EC44CBE0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.4120215073.0000000006380000.00000040.00000800.00020000.00000000.sdmp, Offset: 06380000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_6380000_Po-AD841.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^q$$^q$$^q$$^q
                                                            • API String ID: 0-2125118731
                                                            • Opcode ID: 6f5a65f90543642421444f4a5682eb4439651158d1ebbd0733198d32e8bde59d
                                                            • Instruction ID: c478c6fccc68e3be0f106c02cfc7f73e1767bb9156c2805b6fd8b99e1d51b193
                                                            • Opcode Fuzzy Hash: 6f5a65f90543642421444f4a5682eb4439651158d1ebbd0733198d32e8bde59d
                                                            • Instruction Fuzzy Hash: 60514A30E102059FDF65EB69E990AAEB7B6EF94300F14852AE805DB354DB31EC49CBC1